madox81/SmolLM2-Cyber
Text Generation • 0.1B • Updated • 138
messages listlengths 2 2 |
|---|
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule apt_lolbin { strings: $a = \"certutil.exe\" nocase; $b = \"-urlfetch\" nocase; condition: $a and $b }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"Instal... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventName: 'DeleteFunction' AND SourceIPAddress not in ('aws-internal')",
"role": "user"
},
{
"content": "{\"tactics\": [\"Impact\"], \"techniques\": [\"Data Destruction\"]}",
"role": "ass... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventName: 'UpdateDomainNameservers' AND SourceIPAddress not in ('aws-internal')",
"role": "user"
},
{
"content": "{\"tactics\": [\"Impact\"], \"techniques\": [\"Domain Policy Modification: Trust Policy Modif... |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Incident Type: Command and Control\nTarget: Windows Endpoint\nVector: Malicious Download",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Command and Control\"], \"techniques\": [\"Applicatio... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule fs_recon { strings: $a = \"dir /s\" nocase; $b = \"findstr .conf\" nocase; condition: $a and $b }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"File and Directo... |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Phishing affecting HR Accounts.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Credential Compromise\"}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: rule apt_wasm { strings: $a = \"WebAssembly.compile\" nocase; $b = \"fetch\" nocase; condition: $a and $b }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Network Device CLI\"]... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventID: 4698 AND TaskName contains 'Updater'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Scheduled Task/Job: Scheduled Task\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert tcp any any -> any any (msg:\"Tor Exit Node\"; ip.src in tor_exit_nodes.list; sid:1000020;)",
"role": "user"
},
{
"content": "{\"tactics\": [\"Command and Control\"], \"techniques\": [\"Proxy: Mult... |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Malware Infection affecting Linux Endpoint.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Data Breach\nTarget: MongoDB Instance\nVector: Weak Authentication",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Collection\"], \"techniques\": [\"Data from Databa... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Supply Chain Attack\nTarget: CI/CD Pipeline\nVector: Compromised Dependency",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Trusted ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: DDoS Attack\nTarget: Public Website\nVector: Botnet Traffic",
"role": "user"
},
{
"content": "{\"tactics\": [\"Command and Control\", \"Impact\"], \"techniques\": [\"Botnet\", \"Network De... |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Incident Type: Credential Dumping\nTarget: Cloud IAM Service\nVector: Stolen Service Account Key",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Credential Access\"], \"techniques\": [\"Vali... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: rule apt_php_backdoor { strings: $a = \"eval(gzinflate(\" nocase; condition: $a }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Persistence\"], \"techniques\": [\"Web Shell\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventName: 'RunInstances' AND UserData contains 'ssh-rsa'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Lateral Movement\"], \"techniques\": [\"SSH\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventID: 4103 AND ModuleName contains 'Net.WebClient' AND CommandLine contains 'Invoke'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"PowerShell\"]}",
"role": "assist... |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: DDoS Attack affecting Streaming Service.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Data Breach affecting Apache Cassandra Cluster.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: CommandLine contains 'Invoke-Expression'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"PowerShell\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'Invoke-Command' AND ScriptBlockText contains '-ComputerName'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Lateral Movement\"], \"techniques\": [\"Window... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert udp any any -> any 161 (msg:\"Anomalous SNMP\"; content:\"|30|\"; sid:1000030;)",
"role": "user"
},
{
"content": "{\"tactics\": [\"Collection\"], \"techniques\": [\"Network Sniffing\"]}",
"role... |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Data Breach affecting Apache Cassandra Cluster.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: alert tcp any any -> any 443 (msg:\"Encrypted Payload\"; content:\"|17 03 03|\"; tls; sid:1000033;)",
"role": "user"
},
{
"content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"Software Packing\"]}",
"r... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'http://*.zip'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\"], \"techniques\": [\"Spearphishing Attachment\"]}",
"role": "assistant"
}
] |
[
{
"content": "Analyze the business risk and severity for the input below.\n\nInput: Incident: Supply Chain Attack affecting CI/CD Pipeline.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: selection: EventID: 1 AND Image ends with '\\sc.exe' AND CommandLine contains 'query'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"System Service Discovery\"]}",
"role": ... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'Enter-PSSession' AND ScriptBlockText contains '-ComputerName'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Lateral Movement\"], \"techniques\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'Get-WmiObject' AND ScriptBlockText contains 'Win32_ShadowCopy'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Credential Access\"], \"techniques... |
[
{
"content": "Rate the severity (Low/Medium/High/Critical) and impact of this event.\n\nInput: Incident: Credential Dumping affecting Windows Domain Controller.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Malware Infection\nTarget: Windows POS System\nVector: Spear Phishing Email",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Maliciou... |
[
{
"content": "Extract the relevant tactics and techniques from the input.\n\nInput: rule sh_malware { strings: $a = \"#!/bin/bash\" nocase; $b = \"curl\" nocase; condition: $a and $b }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Command and Scripting Interpret... |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: DDoS Attack affecting E-commerce Platform.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Extract the relevant tactics and techniques from the input.\n\nInput: alert icmp any any -> any any (msg:\"ICMP Exfiltration\"; itype:8; content:\"|FF FF|\"; sid:1000028;)",
"role": "user"
},
{
"content": "{\"tactics\": [\"Exfiltration\"], \"techniques\": [\"Exfiltration Over C2 Channe... |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Data Breach affecting Cloud Object Storage.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: DDoS Attack affecting Web Application.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: alert http any any -> any any (msg:\"SQL Injection\"; content:\"UNION SELECT\"; http_uri; nocase; sid:1000004;)",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\"], \"techniques\": [\"Exploit Publ... |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Malware Infection affecting Windows POS System.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: Incident Type: Supply Chain Attack\nTarget: Third-Party Software\nVector: Compromised Software Update",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Execution\", \"Persistence\"], \"techniques\":... |
[
{
"content": "Extract the relevant tactics and techniques from the input.\n\nInput: rule apt_ruby_script { strings: $a = \"`system`\" nocase; $b = \"Net::HTTP.get\" nocase; condition: $a and $b }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Command and Scriptin... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'aws configure export'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Credential Access\"], \"techniques\": [\"Unsecured Credentials: Container S... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Malware Infection\nTarget: Windows Endpoint\nVector: Malicious Email Attachment",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Mali... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule apk_malware { strings: $a = \"Landroid/os/Exec;\" nocase; condition: $a }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"Hijack Execution Flow\"]}",
"r... |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Discovery of system information to identify potential targets.",
"role": "user"
},
{
"content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"System Information Discovery\"]}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Credential Dumping\nTarget: Windows Server\nVector: Pass-the-Hash Attack",
"role": "user"
},
{
"content": "{\"tactics\": [\"Lateral Movement\", \"Credential Access\"], \"techniques\": [\"O... |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Business Email Compromise affecting CFO Email Account.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Incident Type: Malware Infection\nTarget: Linux Container\nVector: Compromised Docker Image",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Malicious File Ex... |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Ransomware affecting Windows AD Server.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Operational Shutdown\"}",
"role": "assistant"
}
] |
[
{
"content": "Rate the severity (Low/Medium/High/Critical) and impact of this event.\n\nInput: Incident: DDoS Attack affecting Web Application.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert http any any -> any any (msg:\"Ransomware HTTP Request\"; content:\"POST\"; http_method; content:\"encrypt\"; http_uri; sid:1000001;)",
"role": "user"
},
{
"content": "{\"tactics\": [\"Impact\"], \... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventID: 11 AND TargetFilename ends with '.docx' AND Image ends with '\\cmd.exe'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Impact\"], \"techniques\": [\"Data Destruction\"]}",
"role": "assistant"... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: alert dns any any -> any any (msg:\"DNS Amplification\"; content:\"ANY\"; dns_query; sid:1000027;)",
"role": "user"
},
{
"content": "{\"tactics\": [\"Impact\"], \"techniques\": [\"Network DoS: Reflection Amplification\"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 1 AND CommandLine contains 'net group' AND Image ends with '\\net.exe'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"Local Groups\"]}",
"role... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: rule lua_malware { strings: $a = \"os.execute\" nocase; condition: $a }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Command and Scripting Interpreter\"]}",
"role": "assistant"... |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Scanning of network to identify active hosts and open ports.",
"role": "user"
},
{
"content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"Network Service Discovery\"]}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventName: 'DeleteTable' AND SourceIPAddress not in ('aws-internal')",
"role": "user"
},
{
"content": "{\"tactics\": [\"Impact\"], \"techniques\": [\"Data Destruction\"]}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: rule apt_go_binary { strings: $a = \"http.Client\" nocase; $b = \"cmd.Run\" nocase; condition: $a and $b }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Command and Scripting ... |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Incident Type: DDoS Attack\nTarget: E-commerce Platform\nVector: Botnet Flood",
"role": "user"
},
{
"content": "{\"tactics\": [\"Command and Control\", \"Impact\"], \"techniques\": [\"Botnet\", \"Network Denial of... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Credential Dumping\nTarget: Domain Controller\nVector: Pass-the-Hash Attack",
"role": "user"
},
{
"content": "{\"tactics\": [\"Lateral Movement\", \"Credential Access\"], \"techniques\": [... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Ransomware\nTarget: Windows File Share\nVector: Exploited SMB Vulnerability",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Impact\"], \"techniques\": [\"Exploit Rem... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert http any any -> any 443 (msg:\"APT HTTPS Exfil\"; content:\"|POST|\"; http_uri contains \".dat\"; sid:1000064;)",
"role": "user"
},
{
"content": "{\"tactics\": [\"Exfiltration\"], \"techniques\": [... |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: Incident Type: Data Breach\nTarget: Redis Cluster\nVector: Exposed Port",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Collection\"], \"techniques\": [\"Data from Information Repositories\"... |
[
{
"content": "Extract the relevant tactics and techniques from the input.\n\nInput: selection: EventID: 1 AND CommandLine contains 'net view' AND Image ends with '\\cmd.exe'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"Network Share Discovery\"]}",
"role": ... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: alert tcp any any -> any 445 (msg:\"SMB Suspicious Activity\"; content:\"|FF|SMB\"; sid:1000002;)",
"role": "user"
},
{
"content": "{\"tactics\": [\"Command and Control\"], \"techniques\": [\"File Transfer Protocols (FT... |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Data Breach affecting Cloud Data Warehouse.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Extract the relevant tactics and techniques from the input.\n\nInput: selection: EventID: 4625 AND AccountName not in ('SYSTEM', 'NETWORK SERVICE')",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\"], \"techniques\": [\"Valid Accounts\"]}",
"role": "assistant"
}
... |
[
{
"content": "Provide a severity assessment for this security incident.\n\nInput: Incident: Malware Infection affecting Windows POS System.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Extract the relevant tactics and techniques from the input.\n\nInput: selection: EventName: 'Invoke' AND FunctionName contains 'remote' AND SourceIPAddress not in ('aws-internal')",
"role": "user"
},
{
"content": "{\"tactics\": [\"Lateral Movement\"], \"techniques\": [\"Lateral Tool Tr... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert udp any any -> any 5683 (msg:\"CoAP Anomaly\"; content:\"|40|\"; sid:1000049;)",
"role": "user"
},
{
"content": "{\"tactics\": [\"Collection\"], \"techniques\": [\"Network Sniffing\"]}",
"role"... |
[
{
"content": "Analyze the business risk and severity for the input below.\n\nInput: Incident: Data Breach affecting MariaDB Database.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Classify this cybersecurity event into MITRE ATT&CK framework.\n\nInput: rule apt_pypi_package { strings: $a = \"setup.py\" nocase; $b = \"subprocess.run\" nocase; condition: $a and $b }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\"], \"techniques\": [\"Supply Cha... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: Incident Type: Phishing\nTarget: Finance Team Accounts\nVector: Spear Phishing Email",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Malicious File Execution\", \"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: alert tls any any -> any 443 (msg:\"APT TLS C2\"; content:\"|17 03 03|\"; tls.sni contains \"*.xyz\"; sid:1000054;)",
"role": "user"
},
{
"content": "{\"tactics\": [\"Command and Control\"], \"techniques... |
[
{
"content": "Rate the severity (Low/Medium/High/Critical) and impact of this event.\n\nInput: Incident: Data Breach affecting Redis Instance.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule apt_lua_script { strings: $a = \"os.execute\" nocase; $b = \"socket\" nocase; condition: $a and $b }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Command and S... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule apt_wasm { strings: $a = \"WebAssembly.compile\" nocase; $b = \"fetch\" nocase; condition: $a and $b }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Network Dev... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 19 AND EventType: 'WmiEventFilter' AND Name contains 'Updater'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Persistence\"], \"techniques\": [\"Event Triggered Execution: Windows... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: rule lolbin_abuse { strings: $a = \"rundll32.exe\" nocase; $b = \"javascript:\" nocase; condition: $a and $b }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"Sy... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventName: 'DeleteLogGroup' AND SourceIPAddress not in ('aws-internal')",
"role": "user"
},
{
"content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"File Deletion\"]}",
"role"... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: selection: EventID: 4104 AND ScriptBlockText contains 'Get-WmiObject Win32_ComputerSystem'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"System Information Discovery... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventName: 'Publish' AND TopicArn contains 'unauthorized'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Persistence\"], \"techniques\": [\"Server Software Component\"]}",
"role": "assistant"
}
] |
[
{
"content": "Provide a severity assessment for this security incident.\n\nInput: Incident: Privilege Escalation affecting Linux Server.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Data Breach\nTarget: Cloud Data Warehouse\nVector: Leaked Service Account",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Collection\"], \"techniques\": [\"Data from... |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Malware Infection\nTarget: Windows File Server\nVector: Malicious Download",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Malicious... |
[
{
"content": "Extract the relevant tactics and techniques from the input.\n\nInput: selection: EventID: 11 AND TargetFilename contains ':$DATA'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Defense Evasion\"], \"techniques\": [\"Hide Artifacts: Hidden Files and Directories\"]}",
"role": "as... |
[
{
"content": "Analyze the business risk and severity for the input below.\n\nInput: Incident: Data Breach affecting Apache Cassandra Cluster.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Supply Chain Attack affecting CI/CD Pipeline.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Provide a severity assessment for this security incident.\n\nInput: Incident: Ransomware affecting Windows AD Server.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Operational Shutdown\"}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: Incident Type: Living-off-the-Land Attack\nTarget: Linux Endpoint\nVector: Malicious Script Download",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Execution\"], \"techniques\": [\"Command and Sc... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventID: 1 AND CommandLine contains 'net user' AND Image ends with '\\net.exe'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Discovery\"], \"techniques\": [\"Local Account Discovery\"]}",
"role": "as... |
[
{
"content": "Rate the severity (Low/Medium/High/Critical) and impact of this event.\n\nInput: Incident: Supply Chain Attack affecting Third-Party Software.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Phishing affecting HR Accounts.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Credential Compromise\"}",
"role": "assistant"
}
] |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: selection: EventName: 'CreateStack' AND TemplateBody contains 'AWS::Lambda::Function'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Persistence\"], \"techniques\": [\"IIS Components\"]}",
"role": "assistant"
... |
[
{
"content": "Identify the ATT&CK tactics and techniques in this data.\n\nInput: rule vbs_malware { strings: $a = \"CreateObject(\"WScript.Shell\")\" nocase; condition: $a }",
"role": "user"
},
{
"content": "{\"tactics\": [\"Execution\"], \"techniques\": [\"Visual Basic\"]}",
"role": "assistant"... |
[
{
"content": "Analyze the business risk and severity for the input below.\n\nInput: Incident: Credential Dumping affecting Windows Domain Controller.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Rate the severity (Low/Medium/High/Critical) and impact of this event.\n\nInput: Incident: Command and Control affecting Windows Endpoint.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Assess the severity and business risk of the following incident.\n\nInput: Incident: Data Breach affecting Redis Cluster.",
"role": "user"
},
{
"content": "{\"severity\": \"Critical\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |
[
{
"content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Incident Type: Data Breach\nTarget: PostgreSQL Database\nVector: SQL Injection",
"role": "user"
},
{
"content": "{\"tactics\": [\"Initial Access\", \"Collection\"], \"techniques\": [\"Data from Databases... |
[
{
"content": "Extract the relevant tactics and techniques from the input.\n\nInput: selection: EventID: 13 AND TargetObject contains 'HKLM\\\\Software' AND Details contains 'RunOnce'",
"role": "user"
},
{
"content": "{\"tactics\": [\"Persistence\"], \"techniques\": [\"Registry Run Keys / Startup Fol... |
[
{
"content": "Analyze the business risk and severity for the input below.\n\nInput: Incident: DDoS Attack affecting API Gateway.",
"role": "user"
},
{
"content": "{\"severity\": \"High\", \"business_risk\": \"Security Breach\"}",
"role": "assistant"
}
] |