diff --git "a/test/expert_zeroshot_test.json" "b/test/expert_zeroshot_test.json" new file mode 100644--- /dev/null +++ "b/test/expert_zeroshot_test.json" @@ -0,0 +1,1622 @@ +[ + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Capturing screenshots at a configurable interval and uploading them to the attacker. Downloading and executing additional files. Executing arbitrary commands on the system.", + "gold": [ + "T1113", + "T1119", + "T1105", + "T1041", + "T1005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The exploit also contains an additional check that ATMFD.dll is of the exact version \u201c5.0.2.227\u201d. As the Houston Disk exploit supported additional versions, we aren\u2019t fully sure why the version range was narrowed down in DanderSpritz. Compared to ElEi, there is no indicative patch check, which may be because the DanderSpritz files are dated to mid-2013, which is prior to the patch that was identified by Kaspersky and is dated to October 2013.", + "gold": [ + "T1518", + "T1203" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "APT33 registered multiple domains that masquerade as Saudi Arabian aviation companies and Western organizations that together have partnerships to provide training, maintenance and support for Saudi\u2019s military and commercial fleet. Based on observed targeting patterns, APT33 likely used these domains in spear phishing emails to target victim organizations.", + "gold": [ + "T1583.001", + "T1598", + "T1566", + "T1036.005", + "T1598.003" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Another important conclusion we drew from analyzing the exploited vulnerability is that we now know for sure that EpMe exploits CVE-2017-0005. On top of our analysis of both the Equation Group and APT31 exploits, the EpMe exploit aligns perfectly with the details reported in Microsoft\u2019s blog on CVE-2017-0005. And if that wasn\u2019t enough, the exploit indeed stopped working after Microsoft\u2019s March 2017 patch, the patch that addressed the said vulnerability.", + "gold": [ + "T1587.004", + "T1499.004", + "T1588.006", + "T1588.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "DeathStalker has leveraged several malware strains and delivery chains over the years, from the Python- and VisualBasic-based Janicab to the PowerShell-based Powersing and the JavaScript-based Evilnum. The actor consistently used what we call \u201cdead-drop resolvers\u201d (DDRs), which is obfuscated content hosted on major public web services like YouTube, Twitter or Reddit; once decoded by malware this content reveals a command-and-control (C2) server address. DeathStalker also consistently leveraged anti-detection and antivirus evasion techniques, as well as intricate delivery chains that drop lots of files to the target\u2019s filesystems. To kick-start an infection, DeathStalker usually relies on spear-phishing emails with attachments, or links to public file sharing services, as well as script execution based on Windows shortcuts. We have identified how DeathStalker\u2019s malware compromises in clusters or targets various types of entities in all parts of the world, with a possible focus on law and consultancy offices, as well as FINTECH companies, but without a clearly identifiable or consistent interest. The targeting does not seem to be politically or strategically defined and doesn\u2019t appear to be the usual financially motived crime. Because of this, we conclude that DeathStalker is a cyber-mercenary organization.", + "gold": [ + "T1102", + "T1059.007", + "T1059", + "T1204", + "T1059.006", + "T1059.001", + "T1204.002", + "T1566.001", + "T1566.002", + "T1598.002", + "T1566", + "T1587.001", + "T1027", + "T1566.003", + "T1588.001", + "T1059.005", + "T1204.001", + "T1598.003" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "While investigating the activity, we found a CASHY200 PowerShell-based payload that communicated with windows64x[.]com. We analyzed this PowerShell script and found that its DNS tunneling protocol matched the outbound DNS requests at the Kuwait organization which were blocked by DNS Security. We will provide an analysis of CASHY200 and its DNS tunneling protocol in a later section of this blog.", + "gold": [ + "T1572", + "T1059", + "T1071.004", + "T1583.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The infection procedure lists all directories. Then, for each directory, it creates a copy of itself in the drive root directory using the same directory name and changing the directory attribute to \u201chidden\u201d. This results in all the actual directories being hidden and replaced with a copy of the malware using the same directory name.", + "gold": [ + "T1036", + "T1036.005", + "T1083" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Aro.dat is, in fact, an encrypted and compressed PlugX payload. The decryption routine within Aro.dat closely resembles that of older PlugX variants (see Figure 3 below) in that it involves multiple decryption keys and bit shift operations. Once decrypted, it gets decompressed via the Windows API RtlDecompressBuffer into a Windows module (DLL). The compression algorithm is LZ compression (COMPRESSION_FORMAT_LZNT1).", + "gold": [ + "T1027", + "T1106", + "T1140", + "T1027.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The two variants of Helminth do require different delivery methods, with the script variant relying on an Excel spreadsheet for delivery, while the executable variant is more traditional in the fact that it can be installed without a delivery document. We speculate that the executable variant involves threat actors socially engineering the victim into running the payload, rather than installing the payload as the result of successful exploitation of a vulnerability. The multiple delivery methods suggest this threat group is capable of adapting their procedures to suit the current operation in the overarching campaign.", + "gold": [ + "T1204", + "T1204.001", + "T1204.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The services simply call mshta.exe to download an HTML application that downloads and runs the same cryptominer loader.", + "gold": [ + "T1218.005", + "T1105" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "DeathStalker hides strings in Word embedded shape and object (OLE packages) properties, like the \u201chyperlink\u201d property, to obfuscate the malicious execution workflow, as well as reconstruct and execute commands or scripts.", + "gold": [ + "T1036", + "T1027", + "T1140" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Some malicious documents that we managed to retrieve contained a social engineering banner asking users to enable macros execution. This explains how the malicious logic from the macro-based delivery chain could actually be triggered when macros are disabled by default on most modern Office settings.", + "gold": [ + "T1204", + "T1204.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In order to terminate some of these processes and services, DopplePaymer uses an interesting technique that leverages ProcessHacker, a legitimate open-source administrative utility. This application is bundled with a kernel driver that can be used to terminate processes and services. DoppelPaymer is bundled with six portable executable (PE) files that are encrypted and compressed in the malware\u2019s sdata section. These PE files contain 32-bit and 64-bit versions of the following:", + "gold": [ + "T1027", + "T1562.001", + "T1489", + "T1140" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The main payload is encrypted and packed inside the .tls section of the second stage injector. It first gets decrypted and then unpacked with the aPLib compression library. As persistence method, the main payload copies the initial loader to the AppData folder and creates a Jscript file inside the Startup folder which points to it. The second stage injector injects the main payload inside a x86 instance of svchost and patches its API function calls with an obfuscation technique to make static and dynamic analysis of the malware more difficult.", + "gold": [ + "T1055.012", + "T1547.009", + "T1547.001", + "T1055", + "T1140", + "T1036", + "T1027", + "T1027.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The TwoFace loader parses the HTTP POST requests issued by the actor and references data at specific locations, more specifically at certain indexes within the posted data (C# \u201cRequest.Forms\u201d) that the shell will use to determine the functionality the actor wishes to execute. While we did not have logs of HTTP requests for the loader shell, we were able to determine some of the indexes that the webshell will specifically access within the data. Table 2 shows the known indexes within the HTTP POST data that TwoFace references.", + "gold": [ + "T1105", + "T1071.001", + "T1071" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "\"Starting in mid-December 2020, malicious actors that Mandiant tracks as UNC2546 exploited multiple zero-day vulnerabilities in Accellion\u2019s legacy File Transfer Appliance (FTA) to install a newly discovered web shell named DEWMODE. The motivation of UNC2546 was not immediately apparent, but starting in late January 2021, several organizations that had been impacted by UNC2546 in the prior month began receiving extortion emails from actors threatening to publish stolen data on the \u201cCL0P^_- LEAKS\"\" .onion website.\"", + "gold": [ + "T1505.003" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "We confirmed RGDoor installed correctly into IIS by checking the HTTP Modules display in IIS Manager. Figure 2 shows the RGDoor DLL (HTTPParser.dll) was loaded into IIS using the module name HTTPParser.", + "gold": [ + "T1036", + "T1505.004", + "T1036.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The end result is a legitimate, though outdated (version 11, compiled on September 17, 2018, at 10:30:12 UTC), TeamViewer instance hijacked by a malicious sideloaded DLL (MINEBRIDGE).", + "gold": [ + "T1055.001", + "T1588.002", + "T1036.005", + "T1574.002", + "T1036", + "T1219" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "On April 24, 2017, a fourth IP address, this one apparently in the United States, issued 61 commands to the TwoFace webshell. Like the previous set of commands issued in March 2017 from France, this IP address issued the command to obtain objects in the Exchange Trusted Subsystem group, and it appears the actor copied over yet another webshell named \u201cglobal.aspx\u201d and set the file\u2019s attributes to be hidden using the following command:", + "gold": [ + "T1105", + "T1083", + "T1564.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Once the decrypted payload runs in memory, it exhibits the same behaviors as previous PlugX implant variants. It starts by decrypting the embedded PlugX hardcoded configuration settings. The decryption algorithm and XOR keys are fairly consistent across multiple PlugX implants. Code behavior closely resembles that of the RedDelta PlugX that\u2019s been reported by Insikt Group. One noticeable difference with this sample compared to all the other known PlugX malware families is the magic number check performed during the initialization of the PlugX plugins. Historically, that number has always been 0x504C5547, which corresponds to the PLUG value in ASCII encoding. In this sample, the magic number is 0x54484F52, corresponding to the THOR value in ASCII encoding.", + "gold": [ + "T1027", + "T1140" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "BokBot has several executable modules that can be downloaded and injected into a svchost.exe child process. Once the relevant DAT file is decoded using RC4, no additional decoding or decompression is necessary for the executable module DAT files. The executable module header contains information necessary to ID the module:", + "gold": [ + "T1027", + "T1140", + "T1055.003", + "T1055" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The decrypted payload belongs to the malware family POISONPLUG (MD5: 84b69b5d14ba5c5c9258370c9505438f). POISONPLUG is a highly obfuscated modular backdoor with plug-in capabilities. The malware is capable of registry or service persistence, self-removal, plug-in execution, and network connection forwarding. POISONPLUG has been observed using social platforms to host encoded command and control commands.", + "gold": [ + "T1543.003", + "T1569.002", + "T1112", + "T1547.001", + "T1140", + "T1027", + "T1070.004" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The evolution of the reflective DLL injection technique can be found from the relevant PDB paths, and there are a lot of variants of this series of backdoors.", + "gold": [ + "T1620", + "T1055.001", + "T1055" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Our Ramnit sample exploits both CVE-2013-3660 (by PlayBit) and CVE-2014-4113 (using the same exploit code originally found as a 0-Day). The original exploit for CVE-2014-4113 was part of an exploit framework in which the API passes a command-line argument, and that command is executed as SYSTEM. As that wasn\u2019t the original API for PlayBit\u2019s exploit, some adjustments were made and PlayBit\u2019s exploits were re-adjusted to receive a command-line argument to be executed once elevated.", + "gold": [ + "T1203", + "T1068" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In total, we observed three variations of CMSTAR in these recent attacks against Belarusian targets. The biggest change observed between them looks to be minor modifications made to the string obfuscation routine. A very simple modification to the digit used in subtraction was modified between the variants, as shown below:", + "gold": [ + "T1587.001", + "T1027" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "After the execution of qnxfhfim.cmdline, PowerShell initiated the first connection to the fronted domain lumiahelptipsmscdnqa[.]microsoft[.]com used by SMOKEDHAM.", + "gold": [ + "T1059.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The lure documents captured in this attack are in Yiddish[1] The attackers exploit office with OLE autolink objects (CVE-2017-0199) to embed the documents onto malicious websites. All the exploits and malicious payload were uploaded through remote servers. [1]The language is automatically identified by Google Translate _Notification in the pop-up window: _ Links to this document may reference other files. Do you want to update this document with the data in the linked file? Once victims opened the lure document, Word will firstly visit a remote website of IE vbscript 0day (CVE-2018-8174) to trigger the exploit. Afterwards, Shellcode will be running to send several requests to get payload from remote servers. The payload will then be decrypted for further attack. While the payload is running, Word will release three DLL backdoors locally. The backdoors will be installed and executed through PowerShell and rundll32. UAC bypass was used in this process, as well as file steganography and memory reflection uploading, in order to bypass traffic detection and to complete loading without any files. The main process of the attack is shown in the following figure:", + "gold": [ + "T1102", + "T1218.011", + "T1059", + "T1204", + "T1203", + "T1548.002", + "T1204.002", + "T1140", + "T1036", + "T1027", + "T1204.001", + "T1059.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The hooking of IofCallDriver is implemented in a relatively unconventional way. The hook unwinds the execution stack; if it finds any driver in the stack which is not in the rootkit\u2019s allowlist, and that driver attempts to read certain files, a fake \u201creading successful\u201d status is returned. However, the file is not actually read.", + "gold": [ + "T1518.001", + "T1057", + "T1014" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The execution flow of GandCrab 2 is inherited from GandCrab 1 (pictured), and can be roughly divided into three parts: housekeeping (appears in the diagram as teal), C&C Communication (green), actual encryption (yellow) and final housekeeping (teal again). This execution flow proceeds as follows:", + "gold": [ + "T1486" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Each target country is assigned its own operator, who is able to take advantage of local cultural features \u2013 for example, the tendency to use personal email accounts for work. They also made use of a specific proxy server within a country\u2019s borders, to manage connections to infected computers and transfer data to the attackers\u2019 Command-and-Control (C2) servers.", + "gold": [ + "T1090", + "T1090.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Throughout January 2020, FireEye has continued to observe multiple targeted phishing campaigns designed to download and deploy a backdoor we track as MINEBRIDGE. The campaigns primarily targeted financial services organizations in the United States, though targeting is likely more widespread than those we\u2019ve initially observed in our FireEye product telemetry. At least one campaign targeted South Korean organizations, including a marketing agency.", + "gold": [ + "T1105", + "T1566.002", + "T1598.002", + "T1598.003" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Now that we have the decrypted AES key, we can decrypt the actual payload. The Flash downloader uses a custom initialization vector (IV) for the AES algorithm which can be found at offset 0x44 in the encrypted blob and is 16 bytes long:", + "gold": [ + "T1027", + "T1140" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Unlike previously identified RedDelta PlugX samples, this one uses a legitimate Avast Proxy executable for the second DLL side-loading phase rather than the legitimate Adobe executable used in previously analyzed samples. When loaded into memory, the PlugX payload uses www.systeminfor[.]com for command and control \u2014 the same domain used across the Catholic church-themed PlugX samples. Across all four newly analyzed samples, the first stage DLL loader files share an identical, uncommon import hash and rich header with previously observed first stage RedDelta PlugX DLLs. The loaded PlugX payload also matches the custom RedDelta PlugX variant previously described, using RC4 encryption for C2 communications with the same hardcoded RC4 passphrase and configuration block decoding function.", + "gold": [ + "T1104", + "T1574.002", + "T1140", + "T1036", + "T1027", + "T1036.005", + "T1573" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In February 2019, Unit 42 found that a yet-to-be-known threat actor \u2014 unbeknownst to the infosec community \u2014 discovered that the second unpatched vulnerability can not only exploit VirtualBox VBoxDrv.sys driver v1.6.2, but also all other versions up to v3.0.0. Furthermore, our research shows that this unknown actor exploited VirtualBox driver version 2.2.0 to target at least two different Russian organizations in 2017, which we are revealing for the first time. We anticipate this was done because the driver version 2.2.0 wasn\u2019t known to be vulnerable and thus most likely is not on the radar of security companies being exploited. Since no other victims have been found, we believe this is a very rare malware used in targeted attacks only.", + "gold": [ + "T1588.006", + "T1068", + "T1588.005", + "T1211", + "T1203" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "This attack consisted of maldocs masquerading as internal government or military documents. For example, some of the maldocs discovered by Talos masquerade as Indian Air Publications (IAP) documents dictating safeguard procedures for the IT infrastructure of the Indian Air Force (IAF). These documents are aptly named:", + "gold": [ + "T1036" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "After the bootstrap is finished, the exploit triggers a call to the NtGdiBitBlt syscall. This initiates a chain of events in the Windows kernel and eventually passes the flow back to our user-mode callback (DrvBitBlt()) registered by our UMPD. Here lies the heart of the exploit.", + "gold": [ + "T1106", + "T1068" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "When initiated, the Python code attempts to retrieve and use SOCKS/HTTP proxy settings from the victim\u2019s computer. The Python code then tries to initiate a reverse connection to the C2 server (139.59.46[.]154:3543) using a TCP protocol with RSA+AES traffic encryption and obfs3 transport using default keys from Pupy sources.", + "gold": [ + "T1001", + "T1573.001", + "T1090", + "T1571", + "T1090.001", + "T1095", + "T1573" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "\"To gather credentials and facilitate lateral movement, ransomware deployment, the operators used PowerShell to recursively search the file system for logon credentials stored in text files and spreadsheets. The PowerShell tool \"\"SessionGopher\"\", capable of extracting session information from remote access tools, such as WinSCP, PuTTY, FileZilla and more, was also used enabling RDP and the Microsoft Sysinternals utility PsExec to allow lateral movement.\"", + "gold": [ + "T1003", + "T1021.001", + "T1021", + "T1555", + "T1552.001", + "T1005", + "T1059.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The platform is started by the kernel mode driver component (\u201cmsndsrv.sys\u201d on Windows 2000 or above and \u201cmssvc32.vxd\u201d on Windows 9x). The driver then waits for the system to start and initiates execution of the user-mode loader \u201cmscfg32.exe\u201d. The loader then starts the platform\u2019s central module (an orchestrator) from the \u201cmscfg32.dll\u201d module. Additional drivers and libraries may be loaded by different components of the platform, either built-in or auxiliary.", + "gold": [ + "T1543.003", + "T1106" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In June of 2015 a custom downloader used by many newer samples was first seen in the wild and is often included in SFX implants with the name \u201cLocalSMS.dll\u201d. This downloader makes requests to adobe.update-service[.]net (hardcoded in the sample) and is further discussed in Appendix A.", + "gold": [ + "T1036", + "T1105", + "T1036.005", + "T1027.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Here is the script hosted on Pastebin: Reflective loader downloaded from pastebin.com The script executes a hardcoded PE file located \u2014 Gandcrab \u2014at the end of the script using a reflective DLL-loading technique. In addition to the ransomware, we identified another actor trying to execute a Monero miner on the vulnerable server with China Chopper:", + "gold": [ + "T1102", + "T1620" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Ryuk uses a rather basic injection technique, whereby it first gets a handle on the target process using OpenProcess and allocates a buffer in its address space using VirtualAllocEx. The allocated buffer would have the size of the malware\u2019s image and would be required to be positioned at the same base address.", + "gold": [ + "T1055.002", + "T1106", + "T1055" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The following figure shows the content of the downloaded shell script sh. Upon execution, the sh script downloads different architectures of DDoS bot, and runs the downloaded binaries. None of the malwares was available on Virustotal at the time of our discovery, however many of them were uploaded to Virustotal not long after. More and more attack traffic are being detected at the time of writing, indicating that many devices are probably infected already.", + "gold": [ + "T1587.001", + "T1059", + "T1059.004" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "2.\u00a0\u00a0\u00a0\u00a0\u00a0 The \u201cset key\u201d handler is used for accepting the victim ID, a random string with six characters, assigned by the C&C server. It will be attached in each of commands sent from the server and will also be used as the folder name on a cloud storage service to save the stolen data. The victim ID will be stored in the \u201cbps.key\u201d file.", + "gold": [ + "T1041", + "T1567.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "We observed previous, somewhat similar spearphishing scenarios with an archive containing .LNK, .docx, and base64 encoded executable code, delivering offensive Finfisher objects in separate intrusion activity clusters. This activity was not Sofacy, but the spearphishing techniques were somewhat similar \u2013 the layered powershell script attachment technique is not the same, but not altogether new.", + "gold": [ + "T1566.001", + "T1598.002", + "T1547.009" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Out of all the modules used in this attack, Filesystem.dll might be the only one whose code was actually written by the attackers themselves. The purpose of this module is to enumerate drives, folders and files on the infected system and write the final results to two text files: Drives.txt and Files.txt.", + "gold": [ + "T1074.001", + "T1083" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The persistence is guaranteed by a method that is called when the program is closing. It checks if the malware directory exists as specified in an embedded configuration and then copies the malware executable inside it. It also creates a registry key under \u201cHKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\u201d to execute the worm automatically.", + "gold": [ + "T1547", + "T1547.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Assuming the weaponized document\u2019s macro code has executed the encoded, heavily obfuscated JScript code will be saved to disk and executed. One of the first behaviours observed is that of a fake error message box, such as the example in Figure 25. Message text varies but follows a theme of reporting something seemingly legitimate failed to run \u2013 another false sense of security for the victim.", + "gold": [ + "T1059.007", + "T1204", + "T1204.002", + "T1140", + "T1036", + "T1027" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "During our analysis, we identified follow on POST requests containing screenshots of the compromised desktop and process activity lists which were encrypted and appended to a false JPEG header as described previously.", + "gold": [ + "T1057", + "T1071.001", + "T1113", + "T1140" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "To enable lateral movement, the adversary uses ping and nslookup commands, in addition to scanning the environment for Windows systems listening on port 445. This is done using a simple port scanning binary unique to PROPHET SPIDER, typically named pscan or pscan2. For example, process logging may reveal similar commands to the below. Note the commands are executed by the oracle user account, which is the user that runs WebLogic. In multiple PROPHET SPIDER cases, CrowdStrike observed a reverse shell binary located at /var/tmp/[filename], which launches bash as a child; and the pscan2 command is a child to bash. The reverse shell is a child to PID 1, which indicates it was either executed via an init script created for persistence, or its parent was terminated causing it to become a zombie process that was reaped by the init daemon.", + "gold": [ + "T1049", + "T1059", + "T1059.004", + "T1018", + "T1046", + "T1021.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Cardinal RAT is deployed using an interesting technique of compiling and executing a downloader via a malicious macro embedded within a Microsoft Excel file. The Excel files themselves contain lures that have financial themes. This threat has had a low volume of samples in the past two years, with 11 instances of Carp Downloader and 27 instances of Cardinal RAT observed. Palo Alto Networks customers are protected by these threats in the following ways:", + "gold": [ + "T1105", + "T1204", + "T1203", + "T1204.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The global reach of the January 2017 campaign which we analyzed in this post is a marked departure from previous Dimnie targeting tactics. Multiple factors have contributed to Dimnie\u2019s relatively long-lived existence. By masking upload and download network traffic as innocuous user activity, Dimnie has taken advantage of defenders\u2019 assumptions about what normal traffic looks like. This blending in tactic, combined with a prior penchant for targeting systems used by Russian speakers, likely allowed Dimnie to remain relatively unknown.", + "gold": [ + "T1105", + "T1132", + "T1027" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "During the execution of subsequent instructions, a call to the 0x10001D9A function is made. This function has a loop located at offset 0x10001E4D and performs several operations. One of these operations is a 1-byte XOR instruction (xor byte ptr [esi+ecx], al) located at offset 0x10001E4D. Its purpose is to decrypt a total of 110591 bytes of the executable\u2019s resource data where the PE binary data is stored. The final result is an in-memory reconstructed executable file. In Figure 19, the encrypted and decrypted data in the process\u2019s memory can be seen.", + "gold": [ + "T1140" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Agent ORM began circulating alongside Sekur in campaigns throughout the second half of 2015. The malware collects basic system information and is able to take screenshots of victim systems. It is used to download next-stage payloads when systems of interest are identified. It is strongly suspected that Agent ORM has been deprecated in favor of script-based first-stage implants (VB Flash, JS Flash, and Bateleur).", + "gold": [ + "T1113", + "T1059.007", + "T1119", + "T1082", + "T1105", + "T1059.005", + "T1005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In this sense, APT3 crafted its own exploit from other exploits \u2013 a tactic very similar to one used by the Equation group. As this threat group also uses the name UPS team, we decided to name their version of the exploit bundle UPSynergy.", + "gold": [ + "T1587.004", + "T1068", + "T1588.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "First, the module checks if it is running in a target process name and (if specified) by the target username. If the module or user names do not match, the thread terminates.", + "gold": [ + "T1480", + "T1033", + "T1057", + "T1087" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "SMOKEDHAM was observed using UltraVNC to establish a connection to the IP address and port pair 81.91.177[.]54[:]7234 that has been observed in past UNC2465 intrusions.", + "gold": [ + "T1571" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The execution of the modified Mshta file resulted in the creation of a HTM file called loubSi78Vgb9[1].htm that was written to a temporary INetCache directory. Mandiant was not able to acquire this file at the time of writing; however, Mandiant was able to recover partial contents of the file.", + "gold": [ + "T1036.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "But even more curious were the names of malicious drivers in this list, which if found could indicate that the target system has already been compromised by another attacker, and would then warn the operators to \u201cpull back\u201d. Another pivotal component in the Equation Group\u2019s arsenal that is in charge of such checks is called \u201cTerritorial Dispute\u201d, or \u201cTeDi\u201d.", + "gold": [ + "T1082", + "T1480", + "T1083" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In recent OilRig attacks, the threat actors purport to be legitimate service providers offering service and technical troubleshooting as a social engineering theme in their spear-phishing attacks. Earlier OilRig attacks appear to use fake job offers as a social engineering theme. The campaign appears highly targeted and delivers a backdoor we have called \u2018Helminth\u2019. Over the course of the attack campaign, we have observed two different variations of the Helminth backdoor, one written in VBScript and PowerShell that was delivered via a macro within Excel spreadsheets and the other a standalone Windows executable.", + "gold": [ + "T1598.001", + "T1566.001", + "T1566.002", + "T1598.002", + "T1566", + "T1036", + "T1598.003" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "This attacker utilized an additional keylogging utility named C:\\ProgramData\\psh\\console.exe. The keylogging utility was configured to capture and record keystrokes to C:\\ProgramData\\psh\\System32Log.txt.", + "gold": [ + "T1056.001", + "T1056", + "T1074", + "T1074.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "We observed another campaign targeting an organisation located in Lebanon. While our first case describes a targeted campaign with the goal to exfiltrate data affecting internal servers, this one is the opposite: an auxiliary public web site compromised by several attackers for different purposes. We identified actors trying to deploy ransomware on the vulnerable server using China Chopper. The first attempt was Sodinokibi ransomware:", + "gold": [ + "T1102", + "T1584.006", + "T1584.004" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Finally, the Phorpiex VNC worm executes several scripts on a victim\u2019s machine by simulating keyboard input using VNC protocol. First it enters Win+R to open the \u201cRun program\u201d window. Then it \u201centers\u201d the script contents by sending the corresponding VNC packets:", + "gold": [ + "T1059", + "T1059.003", + "T1021.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The second functionality enabled in this sample that had not been observed in previous Thanos variants involved the ability to overwrite the master boot record (MBR). Once the code checks to see if the operating system version is not \u201cWindows 10\u201d or \u201cWindows 8,\u201d the code will attempt to open \u201c\\\\.\\PhysicalDrive0\u201d and write a 512-byte string to offset 0. The byte array that is written to offset 0 of \u201c\\\\.\\PhysicalDrive0\u201d initially has a ransom message of \u201cYour files are encrypted. Contact us at: get-my-data@protonmail.com\u2026\u201d, but the code will replace this string with the following string before writing to disk:", + "gold": [ + "T1561.002", + "T1485", + "T1082" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In several instances, UNC215 used the same exact file against multiple victims and frequently shared infrastructure across victims. This lack of compartmentalization is not uncommon, but does show that UNC215 is relatively less concerned about the ability for their compromises to be linked to each other. C2 servers used by UNC215 frequently reuse the same SSL certificate, as described in Team Cymru\u2019s research in 2020. On one network, between April 2019 and April 2020, an operator repeatedly and infrequently revisited a compromised network whenever an Endpoint Detection and Response (EDR) tool detected or quarantined tools like HYPERBRO and Mimikatz. After several months of repeated detections, UNC215 deployed an updated version of HYPERBRO and a tool called \u201canti.exe\u201d to stop Windows Update service and terminate EDR and Antivirus related services.", + "gold": [ + "T1518.001", + "T1102" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The embedded SWF decrypted contains ActionScript that attempts to exploit a vulnerability. The purpose of aforementioned version check is to make sure that the correct malicious ActionScript is executed to exploit a vulnerability that the Flash player is vulnerable to. Table 1 shows the range of Flash player versions within DealersChoice.A, the embedded SWF file loaded and the associated vulnerability exploited by the loaded SWF.", + "gold": [ + "T1203", + "T1068" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Since initially surfacing in August 2020, the creators of DARKSIDE ransomware and their affiliates have launched a global crime spree affecting organizations in more than 15 countries and multiple industry verticals. Like many of their peers, these actors conduct multifaceted extortion where data is both exfiltrated and encrypted in place, allowing them to demand payment for unlocking and the non-release of stolen data to exert more pressure on victims.", + "gold": [ + "T1041", + "T1486", + "T1020" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In March 2017, Kasperksy released a report that compared DROPSHOT (which they call Stonedrill) with the most recent variant of SHAMOON (referred to as Shamoon 2.0). They stated that both wipers employ anti-emulation techniques and were used to target organizations in Saudi Arabia, but also mentioned several differences. For example, they stated DROPSHOT uses more advanced anti-emulation techniques, utilizes external scripts for self-deletion, and uses memory injection versus external drivers for deployment. Kaspersky also noted the difference in resource language sections: SHAMOON embeds Arabic-Yemen language resources while DROPSHOT embeds Farsi (Persian) language resources.", + "gold": [ + "T1587.001", + "T1070.004" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "If an encrypted command arrives from the C&C, it is decrypted using RC4. The source domain name is used as the decryption key. Once the C&C command has been executed, a [Tasks] section will be created in config.ini; this is a logall actions performed by the bot.", + "gold": [ + "T1027", + "T1573.001", + "T1140", + "T1573" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "To make sure the malware is executed after reboot, Ryuk uses a straight forward persistence technique, whereby it writes itself to the Run registry key using the following command:", + "gold": [ + "T1547", + "T1547.001", + "T1112" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "It also searches for directories with names \u201c.Backup0D\u201d \u2013 \u201c.Backup0M\u201d, and for each directory, removes contained files named \u201ctarget.lnk\u201d and \u201cdesktop.ini\u201d and the directory itself. These directories are also created during the Gauss USB infection.", + "gold": [ + "T1083" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "\"Gather all system information using the \"\"systeminfo\"\" command and record to a file:\u00a0cmd.exe /c systeminfo >>\"\"%s\"\" where %s = .\"", + "gold": [ + "T1074.001", + "T1059", + "T1082", + "T1059.003", + "T1074" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The remainder of this section focuses largely on Object Linking and Embedding (OLE) Microsoft Excel documents, as they are most commonly used by the Hangover group, at least when it comes to the BackConfig malware. Through infrastructure analysis however, Unit 42 was able to find a BackConfig PE sample (SHA256: e28f1bc0b0910757b25b2146ad02798ee6b206a5fe66ce68a28f4ab1538d6a1f; first seen 10/24/2019) using the C2 domain matissues[.]com and dropped by the weaponised Rich Text Format (RTF) file (SHA256: 752c173555edb49a2e1f18141859f22e39155f33f78ea70a3fbe9e2599af3d3f) from the same day. The RTF used the CVE-2017-11882 exploit against equation editor vulnerabilities in Office applications to execute the PE sample which was a unique exploitation method compared to all other samples analyzed.", + "gold": [ + "T1203", + "T1068" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "First technique:\u00a0FIN6 used PowerShell to execute an encoded command. The command consisted of a byte array containing a base64 encoded payload shown in Figure 1.", + "gold": [ + "T1027", + "T1140", + "T1059.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "We first discussed ShaggyPanther, a previously unseen malware and intrusion set targeting Taiwan and Malaysia, in a private report in January 2018. Related activities date back to more than a decade ago, with similar code maintaining compilation timestamps from 2004. Since then, ShaggyPanther activity has been detected in several more locations: most recently in Indonesia in July, and \u2013 somewhat surprisingly \u2013 in Syria in March. The newer 2018 and 2019 backdoor code maintains a new layer of obfuscation and no longer maintains clear-text C2 strings. Since our original release, we have identified an initial server-side infection vector from this actor, using SinoChopper/ChinaChopper, a commonly used web shell shared by multiple Chinese-speaking actors. SinoChopper not only performs host identification and backdoor delivery but also email archive theft and additional activity. Although not all incidents can be traced back to server-side exploitation, we did detect a couple of cases and obtained information about their staged install process. In 2019, we observed ShaggyPanther targeting Windows servers.", + "gold": [ + "T1027", + "T1048", + "T1505.003" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "USB Worm -> this is the USBWorm component developed for stealing files from removable drives, spread across systems by infecting removable media, and download and execute the \u201cThin Client\u201d component from a remote Crimson server.", + "gold": [ + "T1025", + "T1105", + "T1091", + "T1570", + "T1005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "8. Copy \u201cwinrestore.dll\u201d to the directory set in step 6 or 7a with the filename \u201cMSO1234.win\u201d .", + "gold": [ + "T1036", + "T1036.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The cheat sheet is separated into several sections, based on the purpose of the example commands. Fortunately, the commands listed in the cheat sheet provides us with a great deal of insight into some of the tools and techniques the actors will possibly use after compromising the end system. The cheat sheet shows significant batch and PowerShell scripting and a preference for using RDP, as well as the following tools not provided natively in Windows (i.e. thc-hydra, Plink, Mimikatz, Powercat, ProcDump, SharpHound/BloodHound and PowerSploit). Table 1 shows the headers and a description of each section within the cheat sheet.", + "gold": [ + "T1003.001", + "T1059", + "T1082", + "T1059.003", + "T1057", + "T1021", + "T1219", + "T1083", + "T1059.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Later payloads would write batch scripts to disk as well as wget binaries. The batch scripts would use the wget binaries to download and execute additional executables. The scripts would also use wget to send POST requests to command and control (C2) servers that would contain information about the compromised system. Some of these payloads included decoy documents that would open when the malware is executed.", + "gold": [ + "T1105", + "T1059", + "T1041", + "T1082" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In this blog we show that CVE-2017-0005, a Windows Local-Privilege-Escalation (LPE) vulnerability that was attributed to a Chinese APT, was replicated based on an Equation Group exploit for the same vulnerability that the APT was able to access. \u201cEpMe\u201d, the Equation Group exploit for CVE-2017-0005, is one of 4 different LPE exploits included in the DanderSpritz attack framework. EpMe dates back to at least 2013 \u2013 four years before APT31 was caught exploiting this vulnerability in the wild.", + "gold": [ + "T1587.004", + "T1068", + "T1588.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "This watchdog process also ensures that the Cardinal RAT process is always running, as well as ensures that the executable is located in the correct path. Should either of these conditions not be met, the watchdog process will spawn a new instance of Cardinal RAT, or write Cardinal RAT to the correct location, respectively.", + "gold": [ + "T1057" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Zebrocy has continued adding new tools to its arsenal using various kinds of programming languages. We found Zebrocy deploying a compiled Python script, which we call PythocyDbg, within a Southeast Asian foreign affairs organization. This module primarily provides for the stealthy collection of network proxy and communications debug capabilities. In early 2019, Zebrocy shifted its development efforts with the use of Nimrod/Nim, a programming language with syntax resembling both Pascal and Python that can be compiled down to JavaScript or C targets. Both the Nim downloaders that the group mainly uses for spear phishing, and other Nim backdoor code, are currently being produced by Zebrocy and delivered alongside updated compiled AutoIT scripts, Go, and Delphi modules. In September, Zebrocy spear-phished multiple NATO and alliance partners throughout Europe, attempting to gain access to email communications, credentials and sensitive documents. This campaign is similar to past Zebrocy activity, with target-relevant content used within emails, and ZIP attachments containing harmless documents alongside executables with altered icons and identical filenames. The group also makes use of remote Word templates pulling contents from the legitimate Dropbox file-sharing site. In this campaign, Zebrocy targeted defense and diplomatic targets located throughout Europe and Asia with its Go backdoor and Nimcy variants.", + "gold": [ + "T1059.007", + "T1119", + "T1204", + "T1059.006", + "T1027.009", + "T1204.002", + "T1566.001", + "T1598.002", + "T1587.001", + "T1027.002", + "T1036" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "This next stage library copies itself into the System32 directory of the Windows folder after the hardcoded file name \u2014 either KBDLV2.DLL or AUTO.DLL, depending on the malware sample. Then the service is created for the service dll. Service names also can differ from version to version; we discovered the following names \u2014 DriverManage, WebService and WebClientManager. These functions assure malware persistence in a compromised OS between system reboots.", + "gold": [ + "T1543", + "T1036.004", + "T1543.003", + "T1569.002", + "T1036.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "While investigating a recent security incident, Unit 42 found a webshell that we believe was used by the threat actor to remotely access the network of a targeted Middle Eastern organization. The construction of the webshell was interesting by itself, as it was actually two separate webshells: an initial webshell that was responsible for saving and loading the second fully functional webshell. It is this second webshell that enabled the threat actor to run a variety of commands on the compromised server. Due to these two layers, we use the name TwoFace to track this webshell.", + "gold": [ + "T1505.003" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Figure 6 shows our testing of the download command within RGDoor, specifically a command \u201cdownload$c:\\windows\\temp\\test.txt\u201d that downloads the file uploaded in our previous test. We chose to use the key \u201c89\u201d (0x89) in this test to showcase RGDoor\u2019s ability to use any hexadecimal byte as a key, which resulted in an encoded command string of \u201c7eb+5+Xm6O2t6rPV/uDn7eb++tX97OT51f3s+v2n/fH9\u201d. RGDoor responds to this command with the encoded string \u201c/ez6/eDn7ri7uoM=\u201d, which when decrypted with the \u201c89\u201d key results in the string \u2018testing123\\n\u2019, which is the contents of the \u201ctest.txt\u201d file.", + "gold": [ + "T1105", + "T1132", + "T1140" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The second file is downloaded from\u00a0hxxp://checkin.travelsanignacio[.]com/static/20160204.jpg. The C2 response is RC5 decrypted with the key \u201cwsprintfA\u201d and then XORed with\u00a00x74,\u00a0before it is saved as\u00a0C:\\Windows\\System32\\wcnapi.mui.", + "gold": [ + "T1001", + "T1105", + "T1140", + "T1036", + "T1027", + "T1036.005", + "T1573" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "One of the maldocs disclosed here was referred to by a Bit.ly-shortened URL (created Jan. 23, 2020) \u2014 hxxp://bit[.]ly/iaf-guidelines \u2014 which redirects to hxxp://tecbeck[.]com/IAP39031[.]docx. It is highly likely that the attackers hosted the maldocs on a public server and distributed the direct or Bit.ly links to the targets in the form of spear-phishing emails. This may be done to bypass detection systems that scan email attachments for malware.", + "gold": [ + "T1566.002", + "T1598.003" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The back door program used in the APT-C-06 organization's early APT operation was Lucker. It is a set of self-developed and customized modular Trojans. The set of Trojans is powerful, with keyboard recording, voice recording, screen capture, file capture and U disk operation functions, etc. The Lucker \u2018s name comes from the PDB path of this type of Trojan, because most of the backdoor's function use the LK abbreviation. In the middle to late period we have discovered its evolution and two different types of backdoor programs. We have named them Retro and Collector by the PDB path extracted from the program. The Retro backdoor is an evolution of the Lucker backdoor and it actives in a series of attacks from 2016 till now. The name comes from the pdb path of this type of Trojan with the label Retro, and also has the word Retro in the initial installer.", + "gold": [ + "T1113", + "T1005", + "T1083", + "T1123" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Cisco Talos has observed a new malware campaign operated by the Kimsuky APT group since June 2021. Kimsuky, also known as Thallium and Black Banshee, is a North Korean state-sponsored advanced persistent threat (APT) group active since 2012. This campaign utilizes malicious blogs hosted on Blogspot to deliver three types of preliminary malicious content: beacons, file exfiltrators and implant deployment scripts. The implant deployment scripts, in turn, can infect the endpoint with additional implants such as system information-stealers, keyloggers and credential stealers. These implants are derivatives of the Gold Dragon/Brave Prince family of malware operated by Kimsuky since at least 2017 \u2014 now forked into three separate modules. This campaign targets South Korea-based think tanks whose research focuses on political, diplomatic and military topics pertaining to North Korea, China, Russia and the U.S.", + "gold": [ + "T1189", + "T1082" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "This infection chain is based on a Windows shortcut file, with a misleading .docx.lnk double extension, and constitutes a more modular approach to PowerPepper delivery.", + "gold": [ + "T1036", + "T1036.007", + "T1204.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "But these are not the only differences between the two versions: while the Filesystem.dll module was dropped by all the known variants of gpUpdates.exe, it was not always used in the same manner.", + "gold": [ + "T1036" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Vesta Control Panel command injection is one of the several newly included exploits. The version released on May 18 also included Python versions of EternalBlue (CVE-2017-0144) and EternalRomance (CVE-2017-0147) exploits with a Windows download command line as the payload. The addition of new exploits shows that the actor is actively developing new methods of spreading and following the latest vulnerabilities with published PoCs. In the newest instances discovered on May 22, the bot improved its ability to supply credentials for SMB but excluded it from the main exploit function. The usernames and passwords are now in a separate two arrays and extended to include many other usernames and passwords. The exploitation function of this sample does not contain EternalBlue and EternalRomance but attempts to connect over SMB (port 445) and create a service remotely to download and run the main bot file. This latest sample is a pyinstaller-generated sample but is PE file rather than ELF, which was seen previously.", + "gold": [ + "T1543.003", + "T1068", + "T1059", + "T1203", + "T1210", + "T1021", + "T1570", + "T1021.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "During the C2 interactions, PyMICROPSIA downloads two additional samples that are dropped and executed on the victim\u2019s system, running additional functionality. These payloads are not Python / PyInstaller based.", + "gold": [ + "T1105" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "There are multiple web inject files. One contains all of the target URL and hostname data, and the second contains regex patterns, as well as the code to inject. These files are both RC4-encrypted and compressed.", + "gold": [ + "T1027" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The path configured in the VNC configuration file across all implants employing VNC (UltraVNC.ini) is \u201cY:\\\u041f\u0420\u041e\u0411\u0410\\\u0421\u043e\u0437\u0434\u0430\u043d\u0438\u0435 \u0442\u0440\u043e\u044f\u043d\u043e\u0432\\\u0441\u043e\u0437\u0434\u0430\u043d\u0438\u0435 RMS\\vnc\u201d. This isn\u2019t the only place hardcoded Cyrillic file paths are used by implants. Many of the batch scripts also use hardcoded paths such as \u201c\u0413\u043b\u0430\u0432\u043d\u043e\u0435 \u043c\u0435\u043d\u044e\\\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b\\\u0410\u0432\u0442\u043e\u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0430\u201d. Many payloads also include a VBS script which raises a dialog box to the users asking them to run the malware again. It reads, \u201c\u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u0440\u0438 \u0438\u043d\u0438\u0446\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f (0xc0000005). \u041f\u043e\u0432\u0442\u043e\u0440\u0438\u0442\u044c \u043f\u043e\u043f\u044b\u0442\u043a\u0443 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u044f \u0444\u0430\u0439\u043b\u0430?\u201d (English Translation from Russian: Application failed to initialize (0xc0000005). Try to open the file again?).", + "gold": [ + "T1059", + "T1059.003" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "After carrying out the activities for the command, the Trojan will encode the results or output message of the command using the \u2018base64.b16encode\u2019 method. Each command has an output message for both a successful and failed execution of the command with the exception of \u2018empty\u2019 and \u2018terminate\u2019. Table 2 below shows the success and failure messages associated with each command.", + "gold": [ + "T1027" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Mandiant observed this attacker dump the LSASS process using Task Manager to a file named lsass.DMP, and later, zip the dump into two files named lsass.zip and lsass2.zip located in the C:\\ProgramData\\psh\\ directory.", + "gold": [ + "T1003", + "T1074.001", + "T1003.001", + "T1003.004", + "T1560", + "T1074", + "T1560.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "This investigation illustrates an attacker using multiple tools and techniques to implement their full attack chain. A variety of infection artifacts are utilized ranging from bespoke tools (IndigoDrop) to customizable adversarial tools (Cobalt Strike beacons). The attackers also use a combination of public and private servers to host their malicious payloads with a growing trend towards the sole usage of public servers. The use of military-themed maldocs (lures) indicates that government and military organizations in South Asia may be the targets of this threat actor. The maldocs contain bonafide content and are most likely weaponized copies of benign documents known to peek the interests of their targets. The attack variants discovered over time show us that the threat actor can evolve their TTPs in a short period of time. The earliest observable campaigns of this actor date back to April 2018 and continue to operate today along with the most recent evolutions of the attacks. Evidence of rapid ideation, testing and production of new and diversified modules and IndigoDrop iterations indicates highly motivated and agile adversaries. The use of adversarial frameworks like Cobalt Strike suggests that the attackers are looking to expand their malicious arsenal at a significant rate with self-authored and customizable artifacts. Modern-day malware attack chains consist of multiple stages and operational entities. These artifacts and entities may be hosted locally or on remote servers. For example, this attack consists of multiple shellcodes hosted on remote locations downloaded by a local component (IndigoDrop) during runtime to instrument the attack chain. Thus, while network-based detection is important, it should be complemented with system behavior analysis and endpoint protections.", + "gold": [ + "T1036", + "T1588.001", + "T1587.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Since PROPHET SPIDER gains access via web servers or other public-facing servers, they will often initially compromise a Linux-based system. Once initial access is obtained on a Linux system, PROPHET SPIDER typically deploys a webshell, reverse shell binary or a perl reverse shell script (commonly named bc.pl) as their initial persistence mechanism.", + "gold": [ + "T1059", + "T1059.004", + "T1190", + "T1505.003" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "As this is a NULL-Deref vulnerability, we can immediately rule out CVE-2017-0005, as the stack trace shown in Microsoft\u2019s blog has nothing to do with the NULL page. This means that this is possibly another vulnerability found and exploited by Equation Group in 2013. With that out of the way, it is time to understand what triggers this NULL-Deref vulnerability.", + "gold": [ + "T1587.004", + "T1068" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "When Gauss infects an USB memory stick, it sets a certain flag to 30. This TTL (time to live) flag is decremented every time the payload is executed from the stick. Once it reaches 0, the data stealing payload cleans itself from the USB stick. This makes sure that sticks with Gauss infections do not survive ItW for long enough to results in detection.", + "gold": [ + "T1091", + "T1070.004", + "T1052.001", + "T1052" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The ability to launch a .exe or .dll file in memory. The ability to leverage schtasks.exe to add or modify task schedules. The ability to launch custom PowerShell commands. The ability to leverage a standalone executable to load the DLL if the attacker otherwise has no way of doing so.", + "gold": [ + "T1053.005", + "T1053", + "T1059.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Our Next-Generation Firewall caught the first incident of CVE-2020-8515 exploitation on March 31, 2020 at 13:51 (UTC). In addition to this attack, several bots\u2019 attempt to propagate by exploiting CVE-2020-5722 were also caught by our firewall. In the case of CVE-2020-8515 exploitation, the threat actor attempted to download a shell script to the tmp directory, and execute the downloaded script, as shown in Figure 9. In the case of CVE-2020-5722 exploitation, the payload only downloads an arm7 binary and executes it, as shown in Figure 10.", + "gold": [ + "T1068" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In addition, DoppelPaymer is designed to run only after a specific command line argument is provided. The malware computes a CRC32 checksum of the first argument passed on the command line and adds it with a constant value that is hard-coded in the binary. The malware then adds the instruction pointer address to this result, which becomes the destination for a jmp used to continue the malware execution. The hard-coded constant value is unique to each build. In the sampled analyzed, this value was 0x672e6eb7, as shown below in Figure 6.", + "gold": [ + "T1480" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The cheat sheet includes examples of commands needed for persistence, network reconnaissance, pivoting, credential dumping, general system and network data gathering, as well as data exfiltration and commands to configure the system to allow remote desktop protocol (RDP) sessions. The commands provide insight into the techniques the actors will use after compromising a system, as well as the tools used to achieve their objectives. The commands also suggest that the threat group heavily relies on RDP to interact with compromised hosts, likely using secure shell (SSH) tunnels created with the Plink tool between the infected system and an actor-controlled domain. Also, the command examples show the threat group seeks to move across an infiltrated network to target additional devices, making it a greater threat to organizations once infected. According to these commands, the actor would likely make these pivots to other systems by performing credential dumping from the Windows registry and process memory.", + "gold": [ + "T1049", + "T1021.004", + "T1041", + "T1016", + "T1105", + "T1018", + "T1021.001", + "T1021", + "T1570" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The DEWMODE web shell (Figure 4) extracts a list of available files from a MySQL database on the FTA and lists those files and corresponding metadata\u2014file ID, path, filename, uploader, and recipient\u2014on an HTML page. UNC2546 then uses the presented list to download files through the DEWMODE web shell. Download requests are captured in the FTA\u2019s web logs, which will contain requests to the DEWMODE web shell with encrypted and encoded URL parameters, where dwn is the file path and fn is the requested file name (Figure 5). The encrypted file path and name values visible in web logs can be decrypted using key material obtained from the database used by the targeted FTA. Given the complex nature of this process, if your organization needs assistance reviewing relevant logs, please contact Mandiant or Accellion.", + "gold": [ + "T1074.001", + "T1119", + "T1505.003", + "T1074", + "T1027", + "T1005", + "T1573" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Nemucod malware is mostly deployed using weaponized documents where the malicious VBA macro code is responsible for constructing and executing a malicious encoded JScript file that carries out further activities including registering victims with the actors before downloading payloads, which in this case included a credential stealing Trojan executable component.", + "gold": [ + "T1059.007", + "T1059", + "T1204.002", + "T1587.001", + "T1027", + "T1059.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The encrypted payload has a slightly lower entropy of 7.990713 out of 8. Looking at the embedded binary in a hex editor reveals multiple occurrences of the byte pattern 51 36 94 A4 26 5B 0F 19, as seen in Figure 4. As this pattern occurs multiple times in a row in the middle of the encrypted data and ECB mode is being used, an educated guess is that the plaintext is supposed to be 00 00 00 00 00 00 00 00.", + "gold": [ + "T1027" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "After the initial beacon, Gasket sends supplemental requests to a URL of /time/sync to obtain commands from the threat actor, which will look like the following:", + "gold": [ + "T1071.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The TwoFace payload shell requires a password that is sent within HTTP POST data or within the HTTP Cookie, specifically with a field with a name \u201cpwd\u201d. The \u201cpwd\u201d field is used for authentication as a password, which the payload will generate the SHA1 hash and compare it with a hash that is hardcoded within the payload. We extracted the SHA1 hashes used for authentication from the known TwoFace shells, as seen in Table 4 and were able to find the associated password string for three of them. One of the passwords, \u201cRamdanAlKarim12\u201d contains a phrase that means \u201cRamadan the generous\u201d in Arabic (\u0631\u0645\u0636\u0627\u0646 \u0627\u0644\u0643\u0631\u064a\u0645). Another known password is \u201cFreeMe!\u201d, while the last known password contains what may be an acronym of a middle eastern energy organization followed by \u201cpass\u201d. It is possible that the actor chose this acronym based on the targeted organization, but we cannot confirm this.", + "gold": [ + "T1071.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The attack itself is performed in an infinite loop. The IP addresses used for scanning are generated randomly using the rand() function and the GetTickCount() results as a random seed. The only filter rule for an IP address is that it cannot start with 127, 172 or 192. A separate thread is created to communicate with each IP address.", + "gold": [ + "T1106", + "T1046" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The ultimate purpose of the aforementioned components is to install and execute the Komplex payload. The dropper component saves the payload to \u201c/Users/Shared/.local/kextd\u201d (SHA256: 227b7fe495ad9951aebf0aae3c317c1ac526cdd255953f111341b0b11be3bbc5) and ultimately executes the payload. The payload begins by conducting an anti-debugging check to see if it is being debugged before proceeding with executing its main functionality, which can be seen in the \u201cAmIBeingDebugged\u201d function in Figure 6. The \u201cAmIBeingDebugged\u201d function uses the \u201csysctl\u201d function to check to see if a specific \u201cP_TRACED\u201d flag is set, which signifies that the process is being debugged. A particularly interesting part of this function is that it is very similar to the function provided by Apple to its developers in a guide created in 2004 titled \u201cDetecting the Debugger\u201d. This is not the first time the Sofacy group\u2019s malware authors have obtained techniques from publicly available sources, as demonstrated in the use of the Office Test Persistence Method that they obtained from a blog posted in 2014.", + "gold": [ + "T1587.001", + "T1622" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The module sets a timer with a callback function to be executed every 900 seconds and starts a Windows message loop.", + "gold": [ + "T1106" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In the initial versions of the earlier exploits, such as the exploit for CVE-2013-3660 and some versions of CVE-2015-0057, the exploit caused the kernel to execute a token-swapping shellcode stored in user-mode.", + "gold": [ + "T1134.001", + "T1134", + "T1134.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "During the course of our investigations, we noticed that the PowerPepper C2 name servers were actually open DNS resolvers that always resolved arbitrary hostnames with the same IP addresses: 128.49.4.4 (a US Navy-owned server), 91.214.6.100 and 91.214.6.101 (HSBC UK-owned servers). Using this fact and historical reverse DNS resolutions data, we have been able to preemptively identify the PowerPepper C2 domains.", + "gold": [ + "T1583.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "We uncovered two new espionage backdoors associated with Operation Earth Kitsune: agfSpy and dneSpy. This post provides details about these malware types, including the relationship between them and their command and control (C&C) servers .", + "gold": [ + "T1588.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "This new version was dubbed \u201cGandCrab\u00a02\u201d by the\u00a0infosec\u00a0community. However, upon closer inspection\u00a0of the \u2018version\u2019 string embedded into\u00a0GandCrab\u2019s\u00a0C&C check-in, you can see that the gang uses their own nomenclature: the really early versions are\u00a01.1, the later versions go up to\u00a02.1, the first versions of GandCrab 2 were \u00a01.0.0r and the latest version is kto_zaskrinit_tot_pidor (a colorful Russian snarl, aimed at the people who see the version string and reach for their PrintScreen key).", + "gold": [ + "T1587.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The most recent change to the argos-tracking.co[.]uk domain was on the 22nd February 2017 to suspend it. This example highlights the lengths the actors will go to in their reconnaissance of their victims in order to increase their changes of successful compromise.", + "gold": [ + "T1583.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Unlike the common ransomware, systematically distributed via massive spam campaigns and exploit kits, Ryuk is used exclusively for tailored attacks. In fact, its encryption scheme is intentionally built for small-scale operations, such that only crucial assets and resources are infected in each targeted network with its infection and distribution carried out manually by the attackers.", + "gold": [ + "T1587.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "We were able to link most of the decoy contents back to the original contents published on the internet by their initial authors, meaning DeathStalker did not craft them, but instead picked out appropriate ready-made material that was available on the internet. One of the decoy components impersonated a legitimate travel agent but included altered contact details.", + "gold": [ + "T1587.001", + "T1588.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Remcos is a RAT that is offered for sale by a company called Breaking Security. While the company says it will only sell the software for legitimate uses as described in comments in response to the article here and will revoke the licenses for users not following their EULA, the sale of the RAT gives attackers everything they need to establish and run a potentially illegal botnet. Remcos has the functionalities that are typical of a RAT. It is capable of hiding in the system and using malware techniques that make it difficult for the typical user to detect the existence of Remcos. It is written in C++ and is relatively small for the rich functionality it contains. The Remcos payload included by the PowerShell loader is the latest version 2.5.0. Talos has created a decoder that allows simple extraction of Remcos configurations. Cisco Umbrella shows an increase in requests for the default C2 domain dfgdgertdvdf.xyz of the sample around the time we found the initial PowerShell loader. DNS activity for the default C2 domain of the Remcos payload.", + "gold": [ + "T1059.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Interestingly, this IP address also had some associated domain names, as shown in the zoomed-in box as well, including letstrade-bit[.]com, lesbtc[.]com (and mail.lesbtc[.]com) and secure-trade24[.]com with the former two domains being registered December 20th and the latter on December 14th. All three domains mention trading or Bitcoins (BTC) but from the samples analysed, it is not clear how these subdomains are being used, however such terms are indicative of contemporary ransomware that requests ransom payments using BTC.", + "gold": [ + "T1583.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Another sample discovered in late August 2021 consisted of the C2 host URI xxx[.]xxxx[.]tk and the host header setting configured to point to test[.]softlemon[.]net.", + "gold": [ + "T1071.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Figure 3 Portion of malicious macro responsible for compiling and executing embedded source code .", + "gold": [ + "T1027.004" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Malicious macros already embedded, ready to execute. Malicious macro downloaded as part of an externally linked template that is then injected into the original lure maldoc.", + "gold": [ + "T1027.009" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Of interest is the script file docker.container.local.spread.txt, which lists the name of a local Docker image, as shown in Figure 8. The Docker image is a local Docker image, meaning it is not hosted and downloaded from an external docker repository such as Docker Hub. Researchers did search Docker Hub for the presence of this Docker image and none were found.", + "gold": [ + "T1610" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In one part of guide.txt, an example target appears to be provided, with a corresponding adversary IP (185.162.235[.]106) for the legitimate domain to be redirected to. Analysis of this IP provides several interesting data points, including possible relationships to previously observed OilRig infrastructure. Examining the hosting provider shows that the IP is associated with an Iranian hosting provider called NovinVPS. The autonomous system name of the IP shows that the allocation is controlled by Serverius Holding B.V., which is an autonomous system name we have previously seen associated with the OilRig group. In fact, examining the Class C IP block of 185.162.235[.]0/24 shows at least two other IPs we have previously identified as in use by the OilRig group for C2 servers. 185.162.235[.]29 and 185.162.235[.]121 and their associated domains, office365-management[.]com and msoffice-cdn[.]com respectively. Office365-management[.]com was first identified in October 2017 as a C2 servers for OilRig operations delivering the ISMInjector backdoor. Later in February 2018 we were able to link the entire grouping of infrastructure to another campaign delivering the OopsIE backdoor via the reuse of WHOIS registrant artifacts, shared SSL certificates, and a shared Class C IP block. Figure 17 shows the relationship between the files related to DNS hijacking and known infrastructure associated with OilRig.", + "gold": [ + "T1036.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Zebrocy activity is a known subset of Sofacy activity. We predicted that they would continue to innovate within their malware development after observing past behavior, developing with Delphi, AutoIT, .Net C#, Powershell, and now \u201cGo\u201d languages. Their continued targeting, phishing techniques, infrastructure setup, technique and malware innovation, and previously known backdoors help provide strong confidence that this activity continues to be Zebrocy.", + "gold": [ + "T1587.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Gauss highly modular architecture reminds us of Duqu \u2014 it uses an encrypted registry setting to store information on which plugins to load; is designed to stay under the radar, avoid security and monitoring programs and performs highly detailed system monitoring functions. In addition, Gauss contains a 64-bit payload, together with Firefox-compatible browser plugins designed to steal and monitor data from the clients of several Lebanese banks: Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. In addition, it targets users of Citibank and PayPal.", + "gold": [ + "T1176", + "T1119", + "T1082", + "T1140", + "T1027", + "T1033", + "T1005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Figure 18. VirtualAlloc() and byte-copying (call 100045c0) function.", + "gold": [ + "T1106" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "An actor successfully tested China Chopper on a second server and stopped the activity. However, we also found another Monero cryptocurrency miner just as we found commodity malware on other systems compromised with China Chopper. The actors first reset the Access Control List for the Windows temporary files folder and take ownership of the folder. They then allow the miner executable through the Windows Firewall and finally launch the mining payload.", + "gold": [ + "T1496", + "T1562.004", + "T1222.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Then, it reads user-related info from the file sqlxmlx.inc in the same folder (we can see strings referencing to \u201cUserID\u201d commentary in this part of the code). But this file was never created. As you recall, there is a function that should have collected this data and should have saved it into this sqlxmlx.inc file. However, on the first launch, the collected user information is saved into \u201cxmlrwbin.inc\u201d. This effectively means that the malware writer mistakenly coded the bot to save user information into the wrong file. There is a chance for the mistaken code to still work \u2014 user information could be copied into the send information heap. But not in this case \u2013 at the time of writing, the gathered user information variable which should point to the xmlrwbin.inc filename has not yet been initialized, causing the file write to fail. We see that sqlxmlx.inc is not created to store user information.", + "gold": [ + "T1074.001", + "T1119", + "T1087", + "T1074", + "T1033" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The Gasket tool referenced a proxying and tunneling capability known as MagicSocks, which is based on the open-source Chisel project. The actors also created a standalone version of MagicSocks that they would use in addition to Gasket. The standalone MagicSocks tool comes as a dynamic link library (DLL), which the actor also wrote in Golang. The developer of MagicSocks uses code from the Chisel project to tunnel traffic from the local system to an external actor-controlled Chisel server. The tool will build the string R:0.0.0.0:50000:socks that it supplies to the Chisel client code that will generate the following JSON that the client uses as a configuration:", + "gold": [ + "T1095", + "T1572", + "T1090", + "T1090.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "UNC215 made technical modifications to their tools to limit outbound network traffic and used other victim networks to proxy their C2 instructions, likely to minimize the risk of detection and blend in with normal network traffic. The following are examples of HYPERBRO and FOCUSFJORD samples capable of acting as proxies to relay communications to their C2 servers. We do not have enough context about the following samples to attribute all of them to UNC215, though they are representative of activity we have seen from the group.", + "gold": [ + "T1090.003", + "T1090.001", + "T1090", + "T1090.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "One such self-extracting archive (ca87eb1a21c6d4ffd782b225b178ba65463f73de6f4c736eb135be5864f556dc) was first observed around April of 2014.\u00a0 The password (reused by many of the password protected SFX payloads) it used to extract itself is \u201c1234567890__\u201d. The files included in this SFX file we observed include a batch file named \u201c123.cmd\u201d and another SFX named \u201csetting.exe\u201d. This second SFX contains a .MSI installer package which installs Remote Manipulator System and a batch script which handles the installation.", + "gold": [ + "T1027", + "T1059", + "T1059.003", + "T1140" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The next program sent to victims enumerates all the drives on the infected system and executes the following command on them:", + "gold": [ + "T1105", + "T1083", + "T1135", + "T1082" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The BackConfig custom trojan has a flexible plug-in architecture for components offering various features, including the ability to gather system and keylog information and to upload and execute additional payloads.", + "gold": [ + "T1105", + "T1119", + "T1082" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The very first stage of the implant\u2019s code is a custom loader written by APT3, which extracts an encrypted version of DoublePulsar code from incoming SMB packets, and decrypts and executes it. This is in fact a self-modifying piece of code, i.e. before it actually handles any of the aforementioned functionalities, it must decrypt subsequent parts of itself. The code is wrapped in 2 layers using simple crypters, so the first crypter decodes the second, and the latter decodes the actual loader code.", + "gold": [ + "T1105", + "T1140", + "T1620", + "T1587.001", + "T1027", + "T1027.002" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "After executing all the commands given by the server, the bot sends a new request to the server. This request contains a complete log of executed commands. If any of the commands require the bot to send data to the server (i.e., SONIA), they are sent in separate HTTP requests preceding the log request. These requests can also be redirected do a different C&C, if specified in the command parameters.", + "gold": [ + "T1008", + "T1020", + "T1119", + "T1071", + "T1041", + "T1071.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "This Zip archive contained a file named [redacted]-ITsoftwareUpdate.exe (SHA256: 5f42deb792d8d6f347c58ddbf634a673b3e870ed9977fdd88760e38088cd7336), which is a variant of the OopsIE Trojan we described in detail in a blog we published in September 2018. This suggests that the server displayed in the VPS control panel may have indeed been in use by the OilRig threat actors at the time of attack. In addition, two of the other IPs listed in this panel, 185.161.209[.]57 and 185.161.210[.]25 are in the same 185.161.208[.]0/22 range as an IP associated with the DNSpionage campaign, 185.161.211[.]72. This is a tenuous relationship at best and does not indicate that the OilRig group is the one executing the DNSpionage campaign, but with the combination of the use of DeltaHost and IPs belonging to a fairly small range, there may be reason to believe that these are related to some extent.", + "gold": [ + "T1036", + "T1140" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "\u201cMicrosoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset, aka \u201cExcel Featheader Record Memory Corruption Vulnerability.\u201d .", + "gold": [ + "T1203" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Exploitation of CVE-2016-0167 a Microsoft Windows Privilege Escalation vulnerability to gain SYSTEM level privileges. Earlier versions of Shifu exploited CVE-2015-0003 to achieve the same goal. Use of a Windows atom to identify if the host is already infected with Shifu in addition to the mutex used by previous versions. Use of \u201cpush-calc-ret\u201d API obfuscation to hide function calls from malware analysts. Use of alternative Namecoin .bit domains.", + "gold": [ + "T1106", + "T1068" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "This artifact is interesting as the shellcode executed relies on Windows APIs and the payload installed is a Windows DLL that would not run on OSX. This flag does suggest that the threat actors do consider the OSX operating system when developing their malicious exploit code in cross platform file types, such as Flash SWF files. While we cannot confirm this, it is possible that the threat actors could use DealersChoice.A to exploit and load an OSX Trojan if prepared with the appropriate shellcode.", + "gold": [ + "T1106" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "While we do not have telemetry showing how the CASHY200 PowerShell backdoor was delivered, in September 2019 we observed a host based in Kuwait beaconing to the windows64x[.]com domain using the same DNS tunneling protocol as the CASHY200 payload. Fortunately, the beaconing to this domain was blocked by our DNS security service, so the adversary was no longer able to communicate with their payload using this DNS tunnel. By analyzing the lineage of this tool, we found that actors may have used CASHY200 when targeting Kuwait government organizations starting in the spring of 2018 and continuing throughout 2019, according to our open source collection efforts.", + "gold": [ + "T1071.004", + "T1572", + "T1071" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The smartpss.exe file contained metadata describing itself as MSHTA.exe from Microsoft, a legitimate operating system component, but the MD5 hash was unknown. Disassembly analysis of the program showed it was a small application that loaded the IE COM object and launched the function RunHTMLApplication() against the command line argument provided. This functionality matched the behavior of the legitimate MSHTA.exe despite the hash discrepancy. Further analysis showed that the malware was based on a 2018 version of the binary (original hash: 5ced5d5b469724d9992f5e8117ecefb5) with only six bytes of data appended, as shown in Figure 4.", + "gold": [ + "T1036", + "T1559.001", + "T1218.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "12. Execute the exported function \u201cupdater\u201d within \u201cMSO1234.win\u201d using rundll32.exe .", + "gold": [ + "T1218.011" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "In a 2021 campaign, two weeks after PROPHET SPIDER ceased interactive operations, an unattributed actor downloaded a Cobalt Strike stager DLL from a remote IP address. When run with the argument 11985756, the DLL downloaded a Cobalt Strike payload. The adversary used ADFind to enumerate Active Directory, then moved laterally, using a compromised administrative account, and downloading additional Cobalt Strike Beacon payloads onto some systems, or using PSExec to run Cobalt Strike. The adversary further used PowerSploit to enumerate the victim environment. Before deploying ransomware, the adversary staged data in ZIP archives and likely exfiltrated these archives. Batch scripts subsequently deployed MountLocker across the victim environment.", + "gold": [ + "T1078.002", + "T1059", + "T1105", + "T1074", + "T1570", + "T1005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Managed Defense, utilizing FireEye Endpoint Security technology, detected and responded to the threat activity identified within the customer\u2019s environment. The subsequent investigation revealed FIN6 was in the initial phase of an intrusion using stolen credentials, Cobalt Strike, Metasploit, and publicly available tools such as Adfind and 7-Zip to conduct internal reconnaissance, compress data, and aid their overall mission.", + "gold": [ + "T1105", + "T1078" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The second stage of the attack is downloaded from \u201chttp://www.hotinfonews.com/news/dailynews2.php\u201dand executed by the payload of the Java exploit. It acts as a downloader for the next stage of the attack.", + "gold": [ + "T1105", + "T1203" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Afterwards, it uses CreateServiceA to add svchost.exe as a service named \u201cEYService\u201d, and it will then start the service and exit. This service, as we will explain soon, is the core component in the flow and is responsible for processing the commands sent by the attacker.", + "gold": [ + "T1543", + "T1569.002", + "T1106", + "T1569" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The main Trojan body is encrypted \u201cXOR 0xDE\u201d and stored as hex text inside the RTF file. The shellcode simply writes the main dropper to a file named \u201cmsmx21.exe\u201d in the %TEMP% folder and runs it. It also extracts a fake document which is shown to the victim if the exploit has been successful.", + "gold": [ + "T1036", + "T1027", + "T1140" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "This is another aspect that has stayed unmodified in GandCrab 2. Once the information collection phase is over, GandCrab moves to terminate a wide range of processes that might be running on the victim machine and might be holding write access to files. This technique has been previously documented as a part of the Cerber ransomware, and prevents a scenario where GandCrab will attempt to encrypt a file and fail to obtain write access to the file because it is already open in another application. Process termination is done by the standard method of invoking the CreateToolhelp32Snapshot windows API and then iterating over the processes with Process32First and Process32Next. The list shares enough common processes with the one used by Cerber that it\u2019s probable to assume the list was based on the one used in Cerber originally. The list of targeted processes is constant throughout both versions of GandCrab:", + "gold": [ + "T1057", + "T1106" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "This \u201ctransfer\u201d decryption routine returns a URL that is concatenated with the other variables, resulting in\u201dhXXp://www.hotinfonews.com/news/dailynews2.php?id=&t=win\u201d. It is this content that is written to disk and executed on the victim\u2019s machine. A description of that downloader follows. It is most interesting that this exploit/php combination\u2019s encryption routine is different from the obfuscation commonly used throughout Red October modules. It further suggests that potentially this limited use package was developed separately from the rest for a specific target.", + "gold": [ + "T1105" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Comnie Malware Family Comnie uses the RC4 algorithm in multiple locations both to obfuscate strings used by the malware, as well as for network communication. Additionally, the malware looks for multiple security products on victim machines and sometimes alters its behavior depending on the products present. More information about how Comnie handles identified security products may be found in the technical analysis in the Appendix. These security products included those that are known to be most widely used within South Korea and Taiwan. Comnie is able to achieve persistence via a .lnk file that is stored within the victim\u2019s startup path. When originally run, Comnie will convert itself from an executable file to a DLL and will write this newly created DLL to the host machine\u2019s %APPDATA% directory. The built-in Windows utility rundll32.exe is then used to load this DLL by the original .lnk file. Unit 42 has observed a total of two variants of Comnie. One of the ways the variants differ is in how they obtain their command and control (C2) information. Both variants make use of third-party online services in an attempt to prevent DNS based blocking of their first stage communications. However, the obfuscation mechanism varies slightly. In older variants, Comnie was found to look for the \u2018++a++\u2019 markers. The example C2s used by older variants of Comnie demonstrates this:", + "gold": [ + "T1001", + "T1547.009", + "T1104", + "T1547.001", + "T1071.004", + "T1057", + "T1518.001", + "T1140", + "T1071", + "T1027", + "T1573" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "Tools such as XHide Process Faker, which can hide or change the name of Linux processes and PyInstaller, which can convert Python scripts into executables.", + "gold": [ + "T1036", + "T1027", + "T1036.005", + "T1027.005" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The NewsBeef APT previously engaged in long-term, elaborate social engineering schemes that take advantage of popular social network platforms. Previous analysis of the NewsBeef APT indicates that the group focuses on Saudi Arabian (SA) and Western targets, and lacks advanced offensive technology development capabilities.", + "gold": [ + "T1585.001" + ], + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n", + "input": "The sniffer code is similar to the one used in the driver\u2019s \u201ctdip.sys\u201d and \u201cmstcp32.sys\u201d and uses NT4 NDIS-4, XP NDIS-5 interfaces, targeting incoming traffic on Ethernet and VPN (ndiswanip) interfaces. It captures only directed packets (containing a destination address equal to the station address of the NIC). Packers-filtering engine rules may be set via DeviceIoControl messages. Filtered packets are stored in-memory until requested. Maximum packets storage list length is 128 items per filtering rule.", + "gold": [ + "T1040", + "T1106", + "T1205.002" + ], + "predicted": "" + } +] \ No newline at end of file