Dataset Viewer
Auto-converted to Parquet Duplicate
messages
listlengths
2
2
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for newly constructed files from a spearphishing emails with a malicious attachment in an attempt to gain access to victim systems.", "role": "user" }, { "content": "Tacti...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Use of Secure Boot may prevent some implementations of modification to code signing policies.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1553, T1553.006", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Chaos conducts brute force attacks against SSH services to gain initial access.", "role": "user" }, { "content": "Tactics: TA0006\nTechniques: T1110", "role": "assistant" } ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Correlate activity with related suspicious behavior that may indicate an active intrusion to reduce false positives.", "role": "user" }, { "content": "Tactics: TA0006\nTechniques:...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Skidmap has the ability to check whether the infected system’s OS is Debian or RHEL/CentOS to determine which cryptocurrency miner it should use.", "role": "user" }, { "content": ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Derusbi is capable of performing screen captures.", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1113", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Stuxnet uses a driver to scan for specific filesystem driver objects.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1083", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: pass-the-ticket", "role": "user" }, { "content": "Tactics: TA0005, TA0008\nTechniques: T1550.003, T1550", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: ChangeServiceConfigW", "role": "user" }, { "content": "Tactics: TA0040\nTechniques: T1489", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The \"ZR\" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems.", "role": "user" }, { "content": "Tactics: TA0005\nTechnique...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: HAFNIUM has stolen copies of the Active Directory database (NTDS.DIT).", "role": "user" }, { "content": "Tactics: TA0006\nTechniques: T1003.003, T1003", "role": "assistant" ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Several operating system administration utilities exist that can be used to gather this information.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1016", "ro...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport.", "role": "user" }, {...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor executed commands and arguments that may bypass UAC mechanisms to elevate process privileges on system.", "role": "user" }, { "content": "Tactics: TA0004, TA0005\nTechniqu...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Data is compressed with zlib, and bytes are rotated four times before being XOR'ed with 0x23.", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1560.003, T1560", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Kinsing has used SSH for lateral movement.", "role": "user" }, { "content": "Tactics: TA0008\nTechniques: T1021, T1021.004", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: ABK has the ability to use HTTP in communications with C2.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1071, T1071.001", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Sykipot uses SSL for encrypting C2 communications.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1573, T1573.002", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: UEFI BIOS", "role": "user" }, { "content": "Tactics: TA0003, TA0005\nTechniques: T1542.001, T1542", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Magic Hound has conducted watering-hole attacks through media and magazine websites.", "role": "user" }, { "content": "Tactics: TA0001\nTechniques: T1189", "role": "assistant"...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: PoshC2 can enumerate local and domain user account information.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1087.002, T1087, T1087.001", "role": "assistant...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Leviathan has used publicly available tools to dump password hashes, including ProcDump and WCE.", "role": "user" }, { "content": "Tactics: TA0006\nTechniques: T1003, T1003.001", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol.", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: netstat", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1049", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: njRAT is capable of deleting files.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1070, T1070.004", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: These samples communicated with the following hosts via FTP for C2 communication: ftp.byethost7[.]com ftp.byethost10[.]com files.000webhost[.]com Beginning in June 2018, we observed the Oce...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: scheduled task", "role": "user" }, { "content": "Tactics: TA0002, TA0003, TA0004\nTechniques: T1053.005, T1053", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: In this case, the technique could be used for privilege escalation from user to administrator or SYSTEM or from administrator to SYSTEM, depending on the program.", "role": "user" }, ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts, such as communication with I/O ports and using VM-specific instruction...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: capture microphone", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1123", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Both are binaries that may be digitally signed by Microsoft.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1218.009, T1218", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: winlogon", "role": "user" }, { "content": "Tactics: TA0003, TA0004\nTechniques: T1547.004, T1547", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: icacls . /grant Everyone:F /T /C /Q", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1222", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Rundll32.exe is commonly associated with executing DLL payloads (ex: rundll32.exe {DLLname, DLLfunction}).", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1218, T1...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches.", "role": "user" }, { "content": "Tactics: TA0043\nTechniques: T1589.002, ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: AppleSeed can gain system level privilege by passing SeDebugPrivilege to the AdjustTokenPrivilege API.", "role": "user" }, { "content": "Tactics: TA0004, TA0005\nTechniques: T1134...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: PowerShell", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1059", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: 64) u= {B5B70BD7-87FC-499A-B4D1- 98163306F0D8} A GUID r= 1 Boolean value if the malware is running as injected code t= 8035187 Number of milliseconds the computer has been running Ta...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The dir /r command can also be used to display ADSs.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1564, T1564.004", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: However, certain shims can be used to Bypass User Account Control (UAC and RedirectEXE), inject DLLs into processes (InjectDLL), disable Data Execution Prevention (DisableNX) and Structure Ex...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: BloodHound can use PowerShell to pull Active Directory information from the target environment.", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1059.001, T1059", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: FlawedAmmyy enumerates the current user during the initial infection.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1033", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Dok installs a root certificate to aid in Adversary-in-the-Middle actions using the command add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain /tmp/filename.", "role":...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: SPACESHIP identifies files with certain extensions and copies them to a directory in the user's profile.", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1074.001, ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: GrimAgent can sleep for 195 - 205 seconds after payload execution and before deleting its task.", "role": "user" }, { "content": "Tactics: TA0005, TA0007\nTechniques: T1497, T1497...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Filtering based on DKIM+SPF or header analysis can help detect when the email sender is spoofed.When it comes to following links, monitor for references to uncategorized or known-bad sites.",...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Backdoor.Oldrea collects information about the Internet adapter configuration.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1016", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: pbpaste", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1115", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: When flood volumes exceed the capacity of the network connection being targeted, it is typically necessary to intercept the incoming traffic upstream to filter out the attack traffic from the...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Adversaries may search CDN data to gather actionable information.", "role": "user" }, { "content": "Tactics: TA0043\nTechniques: T1596, T1596.004", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Sandworm Team has used port 6789 to accept connections on the group's SSH server.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1571", "role": "assistant" ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: dir c:\\", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1083", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: KOCTOPUS will perform UAC bypass either through fodhelper.exe or eventvwr.exe.", "role": "user" }, { "content": "Tactics: TA0004, TA0005\nTechniques: T1548.002, T1548", "role"...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Molerats actors obtained a list of active processes on the victim and sent them to C2 servers.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1057", "role": "...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: SeaDuke is capable of executing commands.", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1059.003, T1059", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: HermeticWizard has used regsvr32.exe /s /i to execute malicious payloads.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1218, T1218.010", "role": "assistant"...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Similarly, monitoring command line arguments which suppress notifications may highlight potentially malicious activity ( VBoxManage.exe setextradata global GUI/SuppressMessages \"all\").", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Command & Control The malware communicates with the Naver email platform in order to communicate with the operator", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: OLE", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1559, T1559.002", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: capture keystrokes", "role": "user" }, { "content": "Tactics: TA0006, TA0009\nTechniques: T1056", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Victims are targeted by watering hole attacks, and emails with links to malicious websites or with malicious attachments", "role": "user" }, { "content": "Tactics: TA0001\nTechniq...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The Payloads The delivery documents in this attack campaign loaded remote templates whose macros installed a variety of first-stage payloads", "role": "user" }, { "content": "Tact...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: tasklist", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1057", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: cmd is used to execute programs and other actions at the command-line interface.", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1059.003, T1059", "role": "ass...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Get-PassPol", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1201", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: TajMahal has the ability to determine local time on a compromised host.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1124", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Machete uses FTP for Command & Control.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1071.002, T1071", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Get-MicrophoneAudio", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1123", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: CreateProcess", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1106", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: cron", "role": "user" }, { "content": "Tactics: TA0002, TA0003, TA0004\nTechniques: T1053", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Mustang Panda has downloaded additional executables following the initial infection stage.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1105", "role": "assi...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: In macOS and Linux, the currently logged in user can be identified with w and who.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1033", "role": "assistant" ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The White Company has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET.", "role": "user...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Invoke-Kerberoast", "role": "user" }, { "content": "Tactics: TA0006\nTechniques: T1558.003, T1558", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Current User Hive: reg query HKCU /f password /t REG_SZ /s", "role": "user" }, { "content": "Tactics: TA0006\nTechniques: T1552, T1552.002", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: chmod", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1222", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: RunningRAT contains code to compress files.", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1560", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Victim-owned websites may contain a variety of details, including names of departments/divisions, physical locations, and data about key employees such as names, roles, and contact info (ex: ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: LookBack removes itself after execution and can delete files on the system.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1070, T1070.004", "role": "assistan...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for modification of accounts in correlation with other suspicious activity.", "role": "user" }, { "content": "Tactics: TA0003\nTechniques: T1098", "role": "assistant" ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: There are examples of antivirus software being targeted by persistent threat groups to avoid detection.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1211", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Stealth Falcon malware communicates with its C2 server via HTTPS.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1071, T1071.001", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Malware may be placed on infrastructure that was previously purchased/rented by the adversary (Acquire Infrastructure) or was otherwise compromised by them (Compromise Infrastructure).", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: These applications are often websites, but can include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart I...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Consider automatically relaunching forwarding mechanisms at recurring intervals (ex: temporal, on-logon, ) as well as applying appropriate change management to firewall rules and other relate...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Information about installed software may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative o...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: As of OSX 10.10, OSA only supports two languages, JXA and AppleScript.", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1059.007, T1059", "role": "assistant" ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: capture webcam data", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1125", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: RATANKBA uses tasklist /svc to display running tasks.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1007", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Containers can be deployed by various means, such as via Docker's create and start APIs or via a web application such as the Kubernetes dashboard or Kubeflow.", "role": "user" }, { ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for newly constructed containers that may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code.", "role": "user" }, { "conten...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Arp can be used to display ARP configuration information on the host.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1016", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Comnie encrypts command and control communications with RC4.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1573, T1573.001", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: FALLCHILL encrypts C2 data with RC4 encryption.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1573, T1573.001", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: While use of Virtualization/Sandbox Evasion may involve checking for known sandbox values and continuing with execution only if there is no match, the use of guardrails will involve checking ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: CostaBricks has been used to load SombRAT onto a compromised host.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1105", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: KOMPROGO is capable of running WMI queries.", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1047", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session Manager", "role": "user" }, { "content": "Tactics: TA0003, TA0004\nTechniques: T1546.009, T1546", "role": "assi...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for changes to environment variables and files associated with loading shared libraries such as LD_PRELOAD on Linux and DYLD_INSERT_LIBRARIES on macOS.", "role": "user" }, { ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: In addition to staging content to exploit a user's web browser, adversaries may also stage scripting content to profile the user's browser (as in Gather Victim Host Information) to ensure it ...
End of preview. Expand in Data Studio

Adema ChatML Dataset

This dataset is a reformatted version of the original Adema research dataset, structured specifically in ChatML format for seamless integration with SFTTrainer and ChatML-based instruct models. Dataset has three splits:

  • Train: 80%
  • Validation: 10%
  • Test: 10%

Dataset Details

Citation

@article{LI2024103815,
title = {Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence},
journal = {Computers & Security},
volume = {140},
pages = {103815},
year = {2024},
issn = {0167-4048},
doi = {https://doi.org/10.1016/j.cose.2024.103815},
url = {https://www.sciencedirect.com/science/article/pii/S0167404824001160},
author = {Lingzi Li and Cheng Huang and Junren Chen},
keywords = {Cyber threat intelligence, MITRE ATT&CK, Multi-label classification, Network security},
abstract = {As cyber attacks are growing, Cyber Threat Intelligence (CTI) enhances the ability of security systems to resist novel cyber threats. However, since most CTI is unstructured data written in natural language, it needs to be understood and summarized by security experts to be effectively utilized. To address the problem, we adopt the ATT&CK matrix as the taxonomy to propose a method for automated mapping of unstructured threat intelligence to tactics and techniques. The proposed method contains a pre-processor for text denoising, a label extractor for classifying which tactics and techniques category the text belongs to, and a post-processor for correcting the classification results. The label extractor consists of two multi-label classifiers based on DistilBERT for tactics and techniques classification respectively. The post-processor corrects the classification results based on the relations between tactics, techniques, and sub-techniques in the matrix, eliminating errors caused by the independence between categories. In the evaluation, we collect the text data from the ATT&CK knowledge base and real cyber threat reports to build an experiment dataset, which contains 26,602 sentence samples. We apply the proposed method to the dataset to verify its effectiveness. The results show that the proposed method can accurately retrieve tactics and techniques with F0.5 score of 85.50% and 75.17% respectively, which outperforms the baseline method by about 10%.}
}
Downloads last month
24