messages
listlengths
2
2
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for newly constructed files from a spearphishing emails with a malicious attachment in an attempt to gain access to victim systems.", "role": "user" }, { "content": "Tacti...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Use of Secure Boot may prevent some implementations of modification to code signing policies.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1553, T1553.006", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Chaos conducts brute force attacks against SSH services to gain initial access.", "role": "user" }, { "content": "Tactics: TA0006\nTechniques: T1110", "role": "assistant" } ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Correlate activity with related suspicious behavior that may indicate an active intrusion to reduce false positives.", "role": "user" }, { "content": "Tactics: TA0006\nTechniques:...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Skidmap has the ability to check whether the infected system’s OS is Debian or RHEL/CentOS to determine which cryptocurrency miner it should use.", "role": "user" }, { "content": ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Derusbi is capable of performing screen captures.", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1113", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Stuxnet uses a driver to scan for specific filesystem driver objects.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1083", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: pass-the-ticket", "role": "user" }, { "content": "Tactics: TA0005, TA0008\nTechniques: T1550.003, T1550", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: ChangeServiceConfigW", "role": "user" }, { "content": "Tactics: TA0040\nTechniques: T1489", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The \"ZR\" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems.", "role": "user" }, { "content": "Tactics: TA0005\nTechnique...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: HAFNIUM has stolen copies of the Active Directory database (NTDS.DIT).", "role": "user" }, { "content": "Tactics: TA0006\nTechniques: T1003.003, T1003", "role": "assistant" ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Several operating system administration utilities exist that can be used to gather this information.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1016", "ro...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport.", "role": "user" }, {...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor executed commands and arguments that may bypass UAC mechanisms to elevate process privileges on system.", "role": "user" }, { "content": "Tactics: TA0004, TA0005\nTechniqu...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Data is compressed with zlib, and bytes are rotated four times before being XOR'ed with 0x23.", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1560.003, T1560", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Kinsing has used SSH for lateral movement.", "role": "user" }, { "content": "Tactics: TA0008\nTechniques: T1021, T1021.004", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: ABK has the ability to use HTTP in communications with C2.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1071, T1071.001", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Sykipot uses SSL for encrypting C2 communications.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1573, T1573.002", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: UEFI BIOS", "role": "user" }, { "content": "Tactics: TA0003, TA0005\nTechniques: T1542.001, T1542", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Magic Hound has conducted watering-hole attacks through media and magazine websites.", "role": "user" }, { "content": "Tactics: TA0001\nTechniques: T1189", "role": "assistant"...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: PoshC2 can enumerate local and domain user account information.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1087.002, T1087, T1087.001", "role": "assistant...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Leviathan has used publicly available tools to dump password hashes, including ProcDump and WCE.", "role": "user" }, { "content": "Tactics: TA0006\nTechniques: T1003, T1003.001", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol.", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: netstat", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1049", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: njRAT is capable of deleting files.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1070, T1070.004", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: These samples communicated with the following hosts via FTP for C2 communication: ftp.byethost7[.]com ftp.byethost10[.]com files.000webhost[.]com Beginning in June 2018, we observed the Oce...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: scheduled task", "role": "user" }, { "content": "Tactics: TA0002, TA0003, TA0004\nTechniques: T1053.005, T1053", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: In this case, the technique could be used for privilege escalation from user to administrator or SYSTEM or from administrator to SYSTEM, depending on the program.", "role": "user" }, ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts, such as communication with I/O ports and using VM-specific instruction...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: capture microphone", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1123", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Both are binaries that may be digitally signed by Microsoft.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1218.009, T1218", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: winlogon", "role": "user" }, { "content": "Tactics: TA0003, TA0004\nTechniques: T1547.004, T1547", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: icacls . /grant Everyone:F /T /C /Q", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1222", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Rundll32.exe is commonly associated with executing DLL payloads (ex: rundll32.exe {DLLname, DLLfunction}).", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1218, T1...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches.", "role": "user" }, { "content": "Tactics: TA0043\nTechniques: T1589.002, ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: AppleSeed can gain system level privilege by passing SeDebugPrivilege to the AdjustTokenPrivilege API.", "role": "user" }, { "content": "Tactics: TA0004, TA0005\nTechniques: T1134...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: PowerShell", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1059", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: 64) u= {B5B70BD7-87FC-499A-B4D1- 98163306F0D8} A GUID r= 1 Boolean value if the malware is running as injected code t= 8035187 Number of milliseconds the computer has been running Ta...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The dir /r command can also be used to display ADSs.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1564, T1564.004", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: However, certain shims can be used to Bypass User Account Control (UAC and RedirectEXE), inject DLLs into processes (InjectDLL), disable Data Execution Prevention (DisableNX) and Structure Ex...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: BloodHound can use PowerShell to pull Active Directory information from the target environment.", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1059.001, T1059", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: FlawedAmmyy enumerates the current user during the initial infection.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1033", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Dok installs a root certificate to aid in Adversary-in-the-Middle actions using the command add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain /tmp/filename.", "role":...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: SPACESHIP identifies files with certain extensions and copies them to a directory in the user's profile.", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1074.001, ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: GrimAgent can sleep for 195 - 205 seconds after payload execution and before deleting its task.", "role": "user" }, { "content": "Tactics: TA0005, TA0007\nTechniques: T1497, T1497...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Filtering based on DKIM+SPF or header analysis can help detect when the email sender is spoofed.When it comes to following links, monitor for references to uncategorized or known-bad sites.",...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Backdoor.Oldrea collects information about the Internet adapter configuration.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1016", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: pbpaste", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1115", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: When flood volumes exceed the capacity of the network connection being targeted, it is typically necessary to intercept the incoming traffic upstream to filter out the attack traffic from the...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Adversaries may search CDN data to gather actionable information.", "role": "user" }, { "content": "Tactics: TA0043\nTechniques: T1596, T1596.004", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Sandworm Team has used port 6789 to accept connections on the group's SSH server.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1571", "role": "assistant" ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: dir c:\\", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1083", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: KOCTOPUS will perform UAC bypass either through fodhelper.exe or eventvwr.exe.", "role": "user" }, { "content": "Tactics: TA0004, TA0005\nTechniques: T1548.002, T1548", "role"...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Molerats actors obtained a list of active processes on the victim and sent them to C2 servers.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1057", "role": "...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: SeaDuke is capable of executing commands.", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1059.003, T1059", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: HermeticWizard has used regsvr32.exe /s /i to execute malicious payloads.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1218, T1218.010", "role": "assistant"...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Similarly, monitoring command line arguments which suppress notifications may highlight potentially malicious activity ( VBoxManage.exe setextradata global GUI/SuppressMessages \"all\").", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Command & Control The malware communicates with the Naver email platform in order to communicate with the operator", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: OLE", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1559, T1559.002", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: capture keystrokes", "role": "user" }, { "content": "Tactics: TA0006, TA0009\nTechniques: T1056", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Victims are targeted by watering hole attacks, and emails with links to malicious websites or with malicious attachments", "role": "user" }, { "content": "Tactics: TA0001\nTechniq...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The Payloads The delivery documents in this attack campaign loaded remote templates whose macros installed a variety of first-stage payloads", "role": "user" }, { "content": "Tact...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: tasklist", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1057", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: cmd is used to execute programs and other actions at the command-line interface.", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1059.003, T1059", "role": "ass...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Get-PassPol", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1201", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: TajMahal has the ability to determine local time on a compromised host.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1124", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Machete uses FTP for Command & Control.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1071.002, T1071", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Get-MicrophoneAudio", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1123", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: CreateProcess", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1106", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: cron", "role": "user" }, { "content": "Tactics: TA0002, TA0003, TA0004\nTechniques: T1053", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Mustang Panda has downloaded additional executables following the initial infection stage.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1105", "role": "assi...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: In macOS and Linux, the currently logged in user can be identified with w and who.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1033", "role": "assistant" ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: The White Company has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET.", "role": "user...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Invoke-Kerberoast", "role": "user" }, { "content": "Tactics: TA0006\nTechniques: T1558.003, T1558", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Current User Hive: reg query HKCU /f password /t REG_SZ /s", "role": "user" }, { "content": "Tactics: TA0006\nTechniques: T1552, T1552.002", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: chmod", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1222", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: RunningRAT contains code to compress files.", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1560", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Victim-owned websites may contain a variety of details, including names of departments/divisions, physical locations, and data about key employees such as names, roles, and contact info (ex: ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: LookBack removes itself after execution and can delete files on the system.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1070, T1070.004", "role": "assistan...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for modification of accounts in correlation with other suspicious activity.", "role": "user" }, { "content": "Tactics: TA0003\nTechniques: T1098", "role": "assistant" ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: There are examples of antivirus software being targeted by persistent threat groups to avoid detection.", "role": "user" }, { "content": "Tactics: TA0005\nTechniques: T1211", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Stealth Falcon malware communicates with its C2 server via HTTPS.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1071, T1071.001", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Malware may be placed on infrastructure that was previously purchased/rented by the adversary (Acquire Infrastructure) or was otherwise compromised by them (Compromise Infrastructure).", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: These applications are often websites, but can include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart I...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Consider automatically relaunching forwarding mechanisms at recurring intervals (ex: temporal, on-logon, ) as well as applying appropriate change management to firewall rules and other relate...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Information about installed software may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative o...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: As of OSX 10.10, OSA only supports two languages, JXA and AppleScript.", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1059.007, T1059", "role": "assistant" ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: capture webcam data", "role": "user" }, { "content": "Tactics: TA0009\nTechniques: T1125", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: RATANKBA uses tasklist /svc to display running tasks.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1007", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Containers can be deployed by various means, such as via Docker's create and start APIs or via a web application such as the Kubernetes dashboard or Kubeflow.", "role": "user" }, { ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for newly constructed containers that may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code.", "role": "user" }, { "conten...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Arp can be used to display ARP configuration information on the host.", "role": "user" }, { "content": "Tactics: TA0007\nTechniques: T1016", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Comnie encrypts command and control communications with RC4.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1573, T1573.001", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: FALLCHILL encrypts C2 data with RC4 encryption.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1573, T1573.001", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: While use of Virtualization/Sandbox Evasion may involve checking for known sandbox values and continuing with execution only if there is no match, the use of guardrails will involve checking ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: CostaBricks has been used to load SombRAT onto a compromised host.", "role": "user" }, { "content": "Tactics: TA0011\nTechniques: T1105", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: KOMPROGO is capable of running WMI queries.", "role": "user" }, { "content": "Tactics: TA0002\nTechniques: T1047", "role": "assistant" } ]
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session Manager", "role": "user" }, { "content": "Tactics: TA0003, TA0004\nTechniques: T1546.009, T1546", "role": "assi...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: Monitor for changes to environment variables and files associated with loading shared libraries such as LD_PRELOAD on Linux and DYLD_INSERT_LIBRARIES on macOS.", "role": "user" }, { ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security report.\n\nInput: In addition to staging content to exploit a user's web browser, adversaries may also stage scripting content to profile the user's browser (as in Gather Victim Host Information) to ensure it ...