messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for newly constructed files from a spearphishing emails with a malicious attachment in an attempt to gain access to victim systems.",
"role": "user"
},
{
"content": "Tacti... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Use of Secure Boot may prevent some implementations of modification to code signing policies.",
"role": "user"
},
{
"content": "Tactics: TA0005\nTechniques: T1553, T1553.006",
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Chaos conducts brute force attacks against SSH services to gain initial access.",
"role": "user"
},
{
"content": "Tactics: TA0006\nTechniques: T1110",
"role": "assistant"
}
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Correlate activity with related suspicious behavior that may indicate an active intrusion to reduce false positives.",
"role": "user"
},
{
"content": "Tactics: TA0006\nTechniques:... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Skidmap has the ability to check whether the infected system’s OS is Debian or RHEL/CentOS to determine which cryptocurrency miner it should use.",
"role": "user"
},
{
"content": ... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Derusbi is capable of performing screen captures.",
"role": "user"
},
{
"content": "Tactics: TA0009\nTechniques: T1113",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Stuxnet uses a driver to scan for specific filesystem driver objects.",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1083",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: pass-the-ticket",
"role": "user"
},
{
"content": "Tactics: TA0005, TA0008\nTechniques: T1550.003, T1550",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: ChangeServiceConfigW",
"role": "user"
},
{
"content": "Tactics: TA0040\nTechniques: T1489",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The \"ZR\" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems.",
"role": "user"
},
{
"content": "Tactics: TA0005\nTechnique... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: HAFNIUM has stolen copies of the Active Directory database (NTDS.DIT).",
"role": "user"
},
{
"content": "Tactics: TA0006\nTechniques: T1003.003, T1003",
"role": "assistant"
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Several operating system administration utilities exist that can be used to gather this information.",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1016",
"ro... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport.",
"role": "user"
},
{... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor executed commands and arguments that may bypass UAC mechanisms to elevate process privileges on system.",
"role": "user"
},
{
"content": "Tactics: TA0004, TA0005\nTechniqu... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Data is compressed with zlib, and bytes are rotated four times before being XOR'ed with 0x23.",
"role": "user"
},
{
"content": "Tactics: TA0009\nTechniques: T1560.003, T1560",
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Kinsing has used SSH for lateral movement.",
"role": "user"
},
{
"content": "Tactics: TA0008\nTechniques: T1021, T1021.004",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: ABK has the ability to use HTTP in communications with C2.",
"role": "user"
},
{
"content": "Tactics: TA0011\nTechniques: T1071, T1071.001",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Sykipot uses SSL for encrypting C2 communications.",
"role": "user"
},
{
"content": "Tactics: TA0011\nTechniques: T1573, T1573.002",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: UEFI BIOS",
"role": "user"
},
{
"content": "Tactics: TA0003, TA0005\nTechniques: T1542.001, T1542",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Magic Hound has conducted watering-hole attacks through media and magazine websites.",
"role": "user"
},
{
"content": "Tactics: TA0001\nTechniques: T1189",
"role": "assistant"... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: PoshC2 can enumerate local and domain user account information.",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1087.002, T1087, T1087.001",
"role": "assistant... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Leviathan has used publicly available tools to dump password hashes, including ProcDump and WCE.",
"role": "user"
},
{
"content": "Tactics: TA0006\nTechniques: T1003, T1003.001",
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol.",
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: netstat",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1049",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: njRAT is capable of deleting files.",
"role": "user"
},
{
"content": "Tactics: TA0005\nTechniques: T1070, T1070.004",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: These samples communicated with the following hosts via FTP for C2 communication: ftp.byethost7[.]com ftp.byethost10[.]com files.000webhost[.]com Beginning in June 2018, we observed the Oce... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: scheduled task",
"role": "user"
},
{
"content": "Tactics: TA0002, TA0003, TA0004\nTechniques: T1053.005, T1053",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: In this case, the technique could be used for privilege escalation from user to administrator or SYSTEM or from administrator to SYSTEM, depending on the program.",
"role": "user"
},
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts, such as communication with I/O ports and using VM-specific instruction... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: capture microphone",
"role": "user"
},
{
"content": "Tactics: TA0009\nTechniques: T1123",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Both are binaries that may be digitally signed by Microsoft.",
"role": "user"
},
{
"content": "Tactics: TA0005\nTechniques: T1218.009, T1218",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: winlogon",
"role": "user"
},
{
"content": "Tactics: TA0003, TA0004\nTechniques: T1547.004, T1547",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: icacls . /grant Everyone:F /T /C /Q",
"role": "user"
},
{
"content": "Tactics: TA0005\nTechniques: T1222",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Rundll32.exe is commonly associated with executing DLL payloads (ex: rundll32.exe {DLLname, DLLfunction}).",
"role": "user"
},
{
"content": "Tactics: TA0005\nTechniques: T1218, T1... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches.",
"role": "user"
},
{
"content": "Tactics: TA0043\nTechniques: T1589.002, ... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: AppleSeed can gain system level privilege by passing SeDebugPrivilege to the AdjustTokenPrivilege API.",
"role": "user"
},
{
"content": "Tactics: TA0004, TA0005\nTechniques: T1134... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: PowerShell",
"role": "user"
},
{
"content": "Tactics: TA0002\nTechniques: T1059",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: 64) u= {B5B70BD7-87FC-499A-B4D1- 98163306F0D8} A GUID r= 1 Boolean value if the malware is running as injected code t= 8035187 Number of milliseconds the computer has been running Ta... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The dir /r command can also be used to display ADSs.",
"role": "user"
},
{
"content": "Tactics: TA0005\nTechniques: T1564, T1564.004",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: However, certain shims can be used to Bypass User Account Control (UAC and RedirectEXE), inject DLLs into processes (InjectDLL), disable Data Execution Prevention (DisableNX) and Structure Ex... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: BloodHound can use PowerShell to pull Active Directory information from the target environment.",
"role": "user"
},
{
"content": "Tactics: TA0002\nTechniques: T1059.001, T1059",
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: FlawedAmmyy enumerates the current user during the initial infection.",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1033",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Dok installs a root certificate to aid in Adversary-in-the-Middle actions using the command add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain /tmp/filename.",
"role":... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: SPACESHIP identifies files with certain extensions and copies them to a directory in the user's profile.",
"role": "user"
},
{
"content": "Tactics: TA0009\nTechniques: T1074.001, ... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: GrimAgent can sleep for 195 - 205 seconds after payload execution and before deleting its task.",
"role": "user"
},
{
"content": "Tactics: TA0005, TA0007\nTechniques: T1497, T1497... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Filtering based on DKIM+SPF or header analysis can help detect when the email sender is spoofed.When it comes to following links, monitor for references to uncategorized or known-bad sites.",... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Backdoor.Oldrea collects information about the Internet adapter configuration.",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1016",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: pbpaste",
"role": "user"
},
{
"content": "Tactics: TA0009\nTechniques: T1115",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: When flood volumes exceed the capacity of the network connection being targeted, it is typically necessary to intercept the incoming traffic upstream to filter out the attack traffic from the... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Adversaries may search CDN data to gather actionable information.",
"role": "user"
},
{
"content": "Tactics: TA0043\nTechniques: T1596, T1596.004",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Sandworm Team has used port 6789 to accept connections on the group's SSH server.",
"role": "user"
},
{
"content": "Tactics: TA0011\nTechniques: T1571",
"role": "assistant"
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: dir c:\\",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1083",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: KOCTOPUS will perform UAC bypass either through fodhelper.exe or eventvwr.exe.",
"role": "user"
},
{
"content": "Tactics: TA0004, TA0005\nTechniques: T1548.002, T1548",
"role"... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Molerats actors obtained a list of active processes on the victim and sent them to C2 servers.",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1057",
"role": "... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: SeaDuke is capable of executing commands.",
"role": "user"
},
{
"content": "Tactics: TA0002\nTechniques: T1059.003, T1059",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: HermeticWizard has used regsvr32.exe /s /i to execute malicious payloads.",
"role": "user"
},
{
"content": "Tactics: TA0005\nTechniques: T1218, T1218.010",
"role": "assistant"... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Similarly, monitoring command line arguments which suppress notifications may highlight potentially malicious activity ( VBoxManage.exe setextradata global GUI/SuppressMessages \"all\").",
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Command & Control The malware communicates with the Naver email platform in order to communicate with the operator",
"role": "user"
},
{
"content": "Tactics: TA0011\nTechniques: ... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: OLE",
"role": "user"
},
{
"content": "Tactics: TA0002\nTechniques: T1559, T1559.002",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: capture keystrokes",
"role": "user"
},
{
"content": "Tactics: TA0006, TA0009\nTechniques: T1056",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Victims are targeted by watering hole attacks, and emails with links to malicious websites or with malicious attachments",
"role": "user"
},
{
"content": "Tactics: TA0001\nTechniq... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The Payloads The delivery documents in this attack campaign loaded remote templates whose macros installed a variety of first-stage payloads",
"role": "user"
},
{
"content": "Tact... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: tasklist",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1057",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: cmd is used to execute programs and other actions at the command-line interface.",
"role": "user"
},
{
"content": "Tactics: TA0002\nTechniques: T1059.003, T1059",
"role": "ass... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Get-PassPol",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1201",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: TajMahal has the ability to determine local time on a compromised host.",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1124",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Machete uses FTP for Command & Control.",
"role": "user"
},
{
"content": "Tactics: TA0011\nTechniques: T1071.002, T1071",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Get-MicrophoneAudio",
"role": "user"
},
{
"content": "Tactics: TA0009\nTechniques: T1123",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: CreateProcess",
"role": "user"
},
{
"content": "Tactics: TA0002\nTechniques: T1106",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: cron",
"role": "user"
},
{
"content": "Tactics: TA0002, TA0003, TA0004\nTechniques: T1053",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Mustang Panda has downloaded additional executables following the initial infection stage.",
"role": "user"
},
{
"content": "Tactics: TA0011\nTechniques: T1105",
"role": "assi... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: In macOS and Linux, the currently logged in user can be identified with w and who.",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1033",
"role": "assistant"
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The White Company has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET.",
"role": "user... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Invoke-Kerberoast",
"role": "user"
},
{
"content": "Tactics: TA0006\nTechniques: T1558.003, T1558",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Current User Hive: reg query HKCU /f password /t REG_SZ /s",
"role": "user"
},
{
"content": "Tactics: TA0006\nTechniques: T1552, T1552.002",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: chmod",
"role": "user"
},
{
"content": "Tactics: TA0005\nTechniques: T1222",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: RunningRAT contains code to compress files.",
"role": "user"
},
{
"content": "Tactics: TA0009\nTechniques: T1560",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Victim-owned websites may contain a variety of details, including names of departments/divisions, physical locations, and data about key employees such as names, roles, and contact info (ex: ... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: LookBack removes itself after execution and can delete files on the system.",
"role": "user"
},
{
"content": "Tactics: TA0005\nTechniques: T1070, T1070.004",
"role": "assistan... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for modification of accounts in correlation with other suspicious activity.",
"role": "user"
},
{
"content": "Tactics: TA0003\nTechniques: T1098",
"role": "assistant"
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: There are examples of antivirus software being targeted by persistent threat groups to avoid detection.",
"role": "user"
},
{
"content": "Tactics: TA0005\nTechniques: T1211",
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Stealth Falcon malware communicates with its C2 server via HTTPS.",
"role": "user"
},
{
"content": "Tactics: TA0011\nTechniques: T1071, T1071.001",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Malware may be placed on infrastructure that was previously purchased/rented by the adversary (Acquire Infrastructure) or was otherwise compromised by them (Compromise Infrastructure).",
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: These applications are often websites, but can include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart I... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Consider automatically relaunching forwarding mechanisms at recurring intervals (ex: temporal, on-logon, ) as well as applying appropriate change management to firewall rules and other relate... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Information about installed software may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative o... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: As of OSX 10.10, OSA only supports two languages, JXA and AppleScript.",
"role": "user"
},
{
"content": "Tactics: TA0002\nTechniques: T1059.007, T1059",
"role": "assistant"
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: capture webcam data",
"role": "user"
},
{
"content": "Tactics: TA0009\nTechniques: T1125",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: RATANKBA uses tasklist /svc to display running tasks.",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1007",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Containers can be deployed by various means, such as via Docker's create and start APIs or via a web application such as the Kubernetes dashboard or Kubeflow.",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for newly constructed containers that may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code.",
"role": "user"
},
{
"conten... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Arp can be used to display ARP configuration information on the host.",
"role": "user"
},
{
"content": "Tactics: TA0007\nTechniques: T1016",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Comnie encrypts command and control communications with RC4.",
"role": "user"
},
{
"content": "Tactics: TA0011\nTechniques: T1573, T1573.001",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: FALLCHILL encrypts C2 data with RC4 encryption.",
"role": "user"
},
{
"content": "Tactics: TA0011\nTechniques: T1573, T1573.001",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: While use of Virtualization/Sandbox Evasion may involve checking for known sandbox values and continuing with execution only if there is no match, the use of guardrails will involve checking ... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: CostaBricks has been used to load SombRAT onto a compromised host.",
"role": "user"
},
{
"content": "Tactics: TA0011\nTechniques: T1105",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: KOMPROGO is capable of running WMI queries.",
"role": "user"
},
{
"content": "Tactics: TA0002\nTechniques: T1047",
"role": "assistant"
}
] |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session Manager",
"role": "user"
},
{
"content": "Tactics: TA0003, TA0004\nTechniques: T1546.009, T1546",
"role": "assi... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for changes to environment variables and files associated with loading shared libraries such as LD_PRELOAD on Linux and DYLD_INSERT_LIBRARIES on macOS.",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: In addition to staging content to exploit a user's web browser, adversaries may also stage scripting content to profile the user's browser (as in Gather Victim Host Information) to ensure it ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.