Dataset Viewer
Auto-converted to Parquet Duplicate
messages
listlengths
2
2
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule apt_lolbin { strings: $a = \"certutil.exe\" nocase; $b = \"-urlfetch\" nocase; condition: $a and $b }", "role": "user" }, { "content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"Instal...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventName: 'DeleteFunction' AND SourceIPAddress not in ('aws-internal')", "role": "user" }, { "content": "{\"tactics\": [\"Impact\"], \"techniques\": [\"Data Destruction\"]}", "role": "ass...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventName: 'UpdateDomainNameservers' AND SourceIPAddress not in ('aws-internal')", "role": "user" }, { "content": "{\"tactics\": [\"Impact\"], \"techniques\": [\"Domain Policy Modification: Trust Policy Modif...
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Incident Type: Command and Control\nTarget: Windows Endpoint\nVector: Malicious Download", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Command and Control\"], \"techniques\": [\"Applicatio...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule fs_recon { strings: $a = \"dir /s\" nocase; $b = \"findstr .conf\" nocase; condition: $a and $b }", "role": "user" }, { "content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"File and Directo...
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Phishing affecting HR Accounts.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Credential Compromise\"}", "role": "assistant" } ]
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: rule apt_wasm { strings: $a = \"WebAssembly.compile\" nocase; $b = \"fetch\" nocase; condition: $a and $b }", "role": "user" }, { "content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Network Device CLI\"]...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventID: 4698 AND TaskName contains 'Updater'", "role": "user" }, { "content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Scheduled Task/Job: Scheduled Task\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert tcp any any -> any any (msg:\"Tor Exit Node\"; ip.src in tor_exit_nodes.list; sid:1000020;)", "role": "user" }, { "content": "{\"tactics\": [\"Command and Control\"], \"techniques\": [\"Proxy: Mult...
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Malware Infection affecting Linux Endpoint.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Data Breach\nTarget: MongoDB Instance\nVector: Weak Authentication", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Collection\"], \"techniques\": [\"Data from Databa...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Supply Chain Attack\nTarget: CI/CD Pipeline\nVector: Compromised Dependency", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Trusted ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: DDoS Attack\nTarget: Public Website\nVector: Botnet Traffic", "role": "user" }, { "content": "{\"tactics\": [\"Command and Control\", \"Impact\"], \"techniques\": [\"Botnet\", \"Network De...
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Incident Type: Credential Dumping\nTarget: Cloud IAM Service\nVector: Stolen Service Account Key", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Credential Access\"], \"techniques\": [\"Vali...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: rule apt_php_backdoor { strings: $a = \"eval(gzinflate(\" nocase; condition: $a }", "role": "user" }, { "content": "{\"tactics\": [\"Persistence\"], \"techniques\": [\"Web Shell\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventName: 'RunInstances' AND UserData contains 'ssh-rsa'", "role": "user" }, { "content": "{\"tactics\": [\"Lateral Movement\"], \"techniques\": [\"SSH\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventID: 4103 AND ModuleName contains 'Net.WebClient' AND CommandLine contains 'Invoke'", "role": "user" }, { "content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"PowerShell\"]}", "role": "assist...
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: DDoS Attack affecting Streaming Service.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Data Breach affecting Apache Cassandra Cluster.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: CommandLine contains 'Invoke-Expression'", "role": "user" }, { "content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"PowerShell\"]}", "role": "assistant" } ]
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'Invoke-Command' AND ScriptBlockText contains '-ComputerName'", "role": "user" }, { "content": "{\"tactics\": [\"Lateral Movement\"], \"techniques\": [\"Window...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert udp any any -> any 161 (msg:\"Anomalous SNMP\"; content:\"|30|\"; sid:1000030;)", "role": "user" }, { "content": "{\"tactics\": [\"Collection\"], \"techniques\": [\"Network Sniffing\"]}", "role...
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Data Breach affecting Apache Cassandra Cluster.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: alert tcp any any -> any 443 (msg:\"Encrypted Payload\"; content:\"|17 03 03|\"; tls; sid:1000033;)", "role": "user" }, { "content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"Software Packing\"]}", "r...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'http://*.zip'", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\"], \"techniques\": [\"Spearphishing Attachment\"]}", "role": "assistant" } ]
[ { "content": "Analyze the business risk and severity for the input below.\n\nInput: Incident: Supply Chain Attack affecting CI/CD Pipeline.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: selection: EventID: 1 AND Image ends with '\\sc.exe' AND CommandLine contains 'query'", "role": "user" }, { "content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"System Service Discovery\"]}", "role": ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'Enter-PSSession' AND ScriptBlockText contains '-ComputerName'", "role": "user" }, { "content": "{\"tactics\": [\"Lateral Movement\"], \"techniques\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'Get-WmiObject' AND ScriptBlockText contains 'Win32_ShadowCopy'", "role": "user" }, { "content": "{\"tactics\": [\"Credential Access\"], \"techniques...
[ { "content": "Rate the severity (Low/Medium/High/Critical) and impact of this event.\n\nInput: Incident: Credential Dumping affecting Windows Domain Controller.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Malware Infection\nTarget: Windows POS System\nVector: Spear Phishing Email", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Maliciou...
[ { "content": "Extract the relevant tactics and techniques from the input.\n\nInput: rule sh_malware { strings: $a = \"#!/bin/bash\" nocase; $b = \"curl\" nocase; condition: $a and $b }", "role": "user" }, { "content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Command and Scripting Interpret...
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: DDoS Attack affecting E-commerce Platform.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Extract the relevant tactics and techniques from the input.\n\nInput: alert icmp any any -> any any (msg:\"ICMP Exfiltration\"; itype:8; content:\"|FF FF|\"; sid:1000028;)", "role": "user" }, { "content": "{\"tactics\": [\"Exfiltration\"], \"techniques\": [\"Exfiltration Over C2 Channe...
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Data Breach affecting Cloud Object Storage.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: DDoS Attack affecting Web Application.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: alert http any any -> any any (msg:\"SQL Injection\"; content:\"UNION SELECT\"; http_uri; nocase; sid:1000004;)", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\"], \"techniques\": [\"Exploit Publ...
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Malware Infection affecting Windows POS System.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: Incident Type: Supply Chain Attack\nTarget: Third-Party Software\nVector: Compromised Software Update", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Execution\", \"Persistence\"], \"techniques\":...
[ { "content": "Extract the relevant tactics and techniques from the input.\n\nInput: rule apt_ruby_script { strings: $a = \"`system`\" nocase; $b = \"Net::HTTP.get\" nocase; condition: $a and $b }", "role": "user" }, { "content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Command and Scriptin...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'aws configure export'", "role": "user" }, { "content": "{\"tactics\": [\"Credential Access\"], \"techniques\": [\"Unsecured Credentials: Container S...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Malware Infection\nTarget: Windows Endpoint\nVector: Malicious Email Attachment", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Mali...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule apk_malware { strings: $a = \"Landroid/os/Exec;\" nocase; condition: $a }", "role": "user" }, { "content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"Hijack Execution Flow\"]}", "r...
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Discovery of system information to identify potential targets.", "role": "user" }, { "content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"System Information Discovery\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Credential Dumping\nTarget: Windows Server\nVector: Pass-the-Hash Attack", "role": "user" }, { "content": "{\"tactics\": [\"Lateral Movement\", \"Credential Access\"], \"techniques\": [\"O...
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Business Email Compromise affecting CFO Email Account.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Incident Type: Malware Infection\nTarget: Linux Container\nVector: Compromised Docker Image", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Malicious File Ex...
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Ransomware affecting Windows AD Server.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Operational Shutdown\"}", "role": "assistant" } ]
[ { "content": "Rate the severity (Low/Medium/High/Critical) and impact of this event.\n\nInput: Incident: DDoS Attack affecting Web Application.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert http any any -> any any (msg:\"Ransomware HTTP Request\"; content:\"POST\"; http_method; content:\"encrypt\"; http_uri; sid:1000001;)", "role": "user" }, { "content": "{\"tactics\": [\"Impact\"], \...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventID: 11 AND TargetFilename ends with '.docx' AND Image ends with '\\cmd.exe'", "role": "user" }, { "content": "{\"tactics\": [\"Impact\"], \"techniques\": [\"Data Destruction\"]}", "role": "assistant"...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: alert dns any any -> any any (msg:\"DNS Amplification\"; content:\"ANY\"; dns_query; sid:1000027;)", "role": "user" }, { "content": "{\"tactics\": [\"Impact\"], \"techniques\": [\"Network DoS: Reflection Amplification\"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 1 AND CommandLine contains 'net group' AND Image ends with '\\net.exe'", "role": "user" }, { "content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"Local Groups\"]}", "role...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: rule lua_malware { strings: $a = \"os.execute\" nocase; condition: $a }", "role": "user" }, { "content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Command and Scripting Interpreter\"]}", "role": "assistant"...
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Scanning of network to identify active hosts and open ports.", "role": "user" }, { "content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"Network Service Discovery\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventName: 'DeleteTable' AND SourceIPAddress not in ('aws-internal')", "role": "user" }, { "content": "{\"tactics\": [\"Impact\"], \"techniques\": [\"Data Destruction\"]}", "role": "assistant" } ]
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: rule apt_go_binary { strings: $a = \"http.Client\" nocase; $b = \"cmd.Run\" nocase; condition: $a and $b }", "role": "user" }, { "content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Command and Scripting ...
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Incident Type: DDoS Attack\nTarget: E-commerce Platform\nVector: Botnet Flood", "role": "user" }, { "content": "{\"tactics\": [\"Command and Control\", \"Impact\"], \"techniques\": [\"Botnet\", \"Network Denial of...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Credential Dumping\nTarget: Domain Controller\nVector: Pass-the-Hash Attack", "role": "user" }, { "content": "{\"tactics\": [\"Lateral Movement\", \"Credential Access\"], \"techniques\": [...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Ransomware\nTarget: Windows File Share\nVector: Exploited SMB Vulnerability", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Impact\"], \"techniques\": [\"Exploit Rem...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert http any any -> any 443 (msg:\"APT HTTPS Exfil\"; content:\"|POST|\"; http_uri contains \".dat\"; sid:1000064;)", "role": "user" }, { "content": "{\"tactics\": [\"Exfiltration\"], \"techniques\": [...
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Incident Type: Data Breach\nTarget: Redis Cluster\nVector: Exposed Port", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Collection\"], \"techniques\": [\"Data from Information Repositories\"...
[ { "content": "Extract the relevant tactics and techniques from the input.\n\nInput: selection: EventID: 1 AND CommandLine contains 'net view' AND Image ends with '\\cmd.exe'", "role": "user" }, { "content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"Network Share Discovery\"]}", "role": ...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: alert tcp any any -> any 445 (msg:\"SMB Suspicious Activity\"; content:\"|FF|SMB\"; sid:1000002;)", "role": "user" }, { "content": "{\"tactics\": [\"Command and Control\"], \"techniques\": [\"File Transfer Protocols (FT...
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Data Breach affecting Cloud Data Warehouse.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Extract the relevant tactics and techniques from the input.\n\nInput: selection: EventID: 4625 AND AccountName not in ('SYSTEM', 'NETWORK SERVICE')", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\"], \"techniques\": [\"Valid Accounts\"]}", "role": "assistant" } ...
[ { "content": "Provide a severity assessment for this security incident.\n\nInput: Incident: Malware Infection affecting Windows POS System.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Extract the relevant tactics and techniques from the input.\n\nInput: selection: EventName: 'Invoke' AND FunctionName contains 'remote' AND SourceIPAddress not in ('aws-internal')", "role": "user" }, { "content": "{\"tactics\": [\"Lateral Movement\"], \"techniques\": [\"Lateral Tool Tr...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert udp any any -> any 5683 (msg:\"CoAP Anomaly\"; content:\"|40|\"; sid:1000049;)", "role": "user" }, { "content": "{\"tactics\": [\"Collection\"], \"techniques\": [\"Network Sniffing\"]}", "role"...
[ { "content": "Analyze the business risk and severity for the input below.\n\nInput: Incident: Data Breach affecting MariaDB Database.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: rule apt_pypi_package { strings: $a = \"setup.py\" nocase; $b = \"subprocess.run\" nocase; condition: $a and $b }", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\"], \"techniques\": [\"Supply Cha...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: Incident Type: Phishing\nTarget: Finance Team Accounts\nVector: Spear Phishing Email", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Malicious File Execution\", \"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert tls any any -> any 443 (msg:\"APT TLS C2\"; content:\"|17 03 03|\"; tls.sni contains \"*.xyz\"; sid:1000054;)", "role": "user" }, { "content": "{\"tactics\": [\"Command and Control\"], \"techniques...
[ { "content": "Rate the severity (Low/Medium/High/Critical) and impact of this event.\n\nInput: Incident: Data Breach affecting Redis Instance.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule apt_lua_script { strings: $a = \"os.execute\" nocase; $b = \"socket\" nocase; condition: $a and $b }", "role": "user" }, { "content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Command and S...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule apt_wasm { strings: $a = \"WebAssembly.compile\" nocase; $b = \"fetch\" nocase; condition: $a and $b }", "role": "user" }, { "content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Network Dev...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 19 AND EventType: 'WmiEventFilter' AND Name contains 'Updater'", "role": "user" }, { "content": "{\"tactics\": [\"Persistence\"], \"techniques\": [\"Event Triggered Execution: Windows...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule lolbin_abuse { strings: $a = \"rundll32.exe\" nocase; $b = \"javascript:\" nocase; condition: $a and $b }", "role": "user" }, { "content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"Sy...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventName: 'DeleteLogGroup' AND SourceIPAddress not in ('aws-internal')", "role": "user" }, { "content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"File Deletion\"]}", "role"...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'Get-WmiObject Win32_ComputerSystem'", "role": "user" }, { "content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"System Information Discovery...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventName: 'Publish' AND TopicArn contains 'unauthorized'", "role": "user" }, { "content": "{\"tactics\": [\"Persistence\"], \"techniques\": [\"Server Software Component\"]}", "role": "assistant" } ]
[ { "content": "Provide a severity assessment for this security incident.\n\nInput: Incident: Privilege Escalation affecting Linux Server.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Data Breach\nTarget: Cloud Data Warehouse\nVector: Leaked Service Account", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Collection\"], \"techniques\": [\"Data from...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Malware Infection\nTarget: Windows File Server\nVector: Malicious Download", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Malicious...
[ { "content": "Extract the relevant tactics and techniques from the input.\n\nInput: selection: EventID: 11 AND TargetFilename contains ':$DATA'", "role": "user" }, { "content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"Hide Artifacts: Hidden Files and Directories\"]}", "role": "as...
[ { "content": "Analyze the business risk and severity for the input below.\n\nInput: Incident: Data Breach affecting Apache Cassandra Cluster.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Supply Chain Attack affecting CI/CD Pipeline.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Provide a severity assessment for this security incident.\n\nInput: Incident: Ransomware affecting Windows AD Server.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Operational Shutdown\"}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: Incident Type: Living-off-the-Land Attack\nTarget: Linux Endpoint\nVector: Malicious Script Download", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Command and Sc...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventID: 1 AND CommandLine contains 'net user' AND Image ends with '\\net.exe'", "role": "user" }, { "content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"Local Account Discovery\"]}", "role": "as...
[ { "content": "Rate the severity (Low/Medium/High/Critical) and impact of this event.\n\nInput: Incident: Supply Chain Attack affecting Third-Party Software.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Phishing affecting HR Accounts.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Credential Compromise\"}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventName: 'CreateStack' AND TemplateBody contains 'AWS::Lambda::Function'", "role": "user" }, { "content": "{\"tactics\": [\"Persistence\"], \"techniques\": [\"IIS Components\"]}", "role": "assistant" ...
[ { "content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: rule vbs_malware { strings: $a = \"CreateObject(\"WScript.Shell\")\" nocase; condition: $a }", "role": "user" }, { "content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Visual Basic\"]}", "role": "assistant"...
[ { "content": "Analyze the business risk and severity for the input below.\n\nInput: Incident: Credential Dumping affecting Windows Domain Controller.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Rate the severity (Low/Medium/High/Critical) and impact of this event.\n\nInput: Incident: Command and Control affecting Windows Endpoint.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Data Breach affecting Redis Cluster.", "role": "user" }, { "content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Data Breach\nTarget: PostgreSQL Database\nVector: SQL Injection", "role": "user" }, { "content": "{\"tactics\": [\"Initial Access\", \"Collection\"], \"techniques\": [\"Data from Databases...
[ { "content": "Extract the relevant tactics and techniques from the input.\n\nInput: selection: EventID: 13 AND TargetObject contains 'HKLM\\\\Software' AND Details contains 'RunOnce'", "role": "user" }, { "content": "{\"tactics\": [\"Persistence\"], \"techniques\": [\"Registry Run Keys / Startup Fol...
[ { "content": "Analyze the business risk and severity for the input below.\n\nInput: Incident: DDoS Attack affecting API Gateway.", "role": "user" }, { "content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}", "role": "assistant" } ]
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
47

Models trained or fine-tuned on madox81/mittre_severity_ds