instruction
stringclasses
4 values
input
stringlengths
47
5.51k
output
stringclasses
833 values
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Android ### Target Entity: iOS ### Text Passage: YiSpecter is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. YiSpecter abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TA544 ### Target Entity: Italy ### Text Passage: TA544 is a cybercriminal threat actor that distributes banking malware and other payloads in various geographic regions including Italy and Japan. Proofpoint has tracked this actor since 2017. Typically, this group varies its payloads which appear to be targeted by region – for example, in 2021, all TA544 Ursnif campaigns have specifically targeted Italian organizations while Dridex payloads associated with this threat actor do not have specific geographic targeting.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TA544 ### Target Entity: Japan ### Text Passage: TA544 is a cybercriminal threat actor that distributes banking malware and other payloads in various geographic regions including Italy and Japan. Proofpoint has tracked this actor since 2017. Typically, this group varies its payloads which appear to be targeted by region – for example, in 2021, all TA544 Ursnif campaigns have specifically targeted Italian organizations while Dridex payloads associated with this threat actor do not have specific geographic targeting.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Ursnif ### Target Entity: Italian ### Text Passage: TA544 is a cybercriminal threat actor that distributes banking malware and other payloads in various geographic regions including Italy and Japan. Proofpoint has tracked this actor since 2017. Typically, this group varies its payloads which appear to be targeted by region – for example, in 2021, all TA544 Ursnif campaigns have specifically targeted Italian organizations while Dridex payloads associated with this threat actor do not have specific geographic targeting.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Ursnif ### Target Entity: TA544 ### Text Passage: TA544 is a cybercriminal threat actor that distributes banking malware and other payloads in various geographic regions including Italy and Japan. Proofpoint has tracked this actor since 2017. Typically, this group varies its payloads which appear to be targeted by region – for example, in 2021, all TA544 Ursnif campaigns have specifically targeted Italian organizations while Dridex payloads associated with this threat actor do not have specific geographic targeting.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: BusyGasper ### Target Entity: Android ### Text Passage: BusyGasper is Android spyware that has been in use since May 2016. There have been less than 10 victims, all who appear to be located in Russia, that were all infected via physical access to the device.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: BusyGasper ### Target Entity: Russia ### Text Passage: BusyGasper is Android spyware that has been in use since May 2016. There have been less than 10 victims, all who appear to be located in Russia, that were all infected via physical access to the device.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Android ### Target Entity: BusyGasper ### Text Passage: BusyGasper is Android spyware that has been in use since May 2016. There have been less than 10 victims, all who appear to be located in Russia, that were all infected via physical access to the device.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: SharpDisco ### Target Entity: C# ### Text Passage: SharpDisco is a dropper developed in C# that has been used by MoustachedBouncer since at least 2020 to load malicious plugins.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: MoustachedBouncer ### Target Entity: SharpDisco ### Text Passage: SharpDisco is a dropper developed in C# that has been used by MoustachedBouncer since at least 2020 to load malicious plugins.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: MoustachedBouncer ### Target Entity: C# ### Text Passage: SharpDisco is a dropper developed in C# that has been used by MoustachedBouncer since at least 2020 to load malicious plugins.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Squirrelwaffle ### Target Entity: Cobalt Strike ### Text Passage: Squirrelwaffle is a loader that was first seen in September 2021. It has been used in spam email campaigns to deliver additional malware such as Cobalt Strike and the QakBot banking trojan.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Squirrelwaffle ### Target Entity: QakBot ### Text Passage: Squirrelwaffle is a loader that was first seen in September 2021. It has been used in spam email campaigns to deliver additional malware such as Cobalt Strike and the QakBot banking trojan.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: AADInternals ### Target Entity: Azure Active Directory ### Text Passage: AADInternals is a PowerShell-based framework for administering, enumerating, and exploiting Azure Active Directory. The tool is publicly available on GitHub.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: AADInternals ### Target Entity: PowerShell ### Text Passage: AADInternals is a PowerShell-based framework for administering, enumerating, and exploiting Azure Active Directory. The tool is publicly available on GitHub.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: GitHub ### Target Entity: Azure Active Directory ### Text Passage: AADInternals is a PowerShell-based framework for administering, enumerating, and exploiting Azure Active Directory. The tool is publicly available on GitHub.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Bad Rabbit ### Target Entity: Flash Player ### Text Passage: Bad Rabbit has masqueraded as a Flash Player installer through the executable file install_flash_player.exe.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: install_flash_player.exe ### Target Entity: Flash Player ### Text Passage: Bad Rabbit has masqueraded as a Flash Player installer through the executable file install_flash_player.exe.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Kwampirs ### Target Entity: netstat ### Text Passage: Kwampirs collects a list of active and listening connections by using the command netstat -nao as well as a list of available network mappings with net use.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Cinnamon Tempest ### Target Entity: Cheerscrypt ### Text Passage: Cheerscrypt is a ransomware that was developed by Cinnamon Tempest and has been used in attacks against ESXi and Windows environments since at least 2022. Cheerscrypt was derived from the leaked Babuk source code and has infrastructure overlaps with deployments of Night Sky ransomware, which was also derived from Babuk.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Cheerscrypt ### Target Entity: ESXi ### Text Passage: Cheerscrypt is a ransomware that was developed by Cinnamon Tempest and has been used in attacks against ESXi and Windows environments since at least 2022. Cheerscrypt was derived from the leaked Babuk source code and has infrastructure overlaps with deployments of Night Sky ransomware, which was also derived from Babuk.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Cheerscrypt ### Target Entity: Windows ### Text Passage: Cheerscrypt is a ransomware that was developed by Cinnamon Tempest and has been used in attacks against ESXi and Windows environments since at least 2022. Cheerscrypt was derived from the leaked Babuk source code and has infrastructure overlaps with deployments of Night Sky ransomware, which was also derived from Babuk.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Cheerscrypt ### Target Entity: Babuk ### Text Passage: Cheerscrypt is a ransomware that was developed by Cinnamon Tempest and has been used in attacks against ESXi and Windows environments since at least 2022. Cheerscrypt was derived from the leaked Babuk source code and has infrastructure overlaps with deployments of Night Sky ransomware, which was also derived from Babuk.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Babuk ### Target Entity: Cheerscrypt ### Text Passage: Cheerscrypt is a ransomware that was developed by Cinnamon Tempest and has been used in attacks against ESXi and Windows environments since at least 2022. Cheerscrypt was derived from the leaked Babuk source code and has infrastructure overlaps with deployments of Night Sky ransomware, which was also derived from Babuk.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Deep Panda ### Target Entity: StreamEx ### Text Passage: StreamEx is a malware family that has been used by Deep Panda since at least 2015. In 2016, it was distributed via legitimate compromised Korean websites.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: StreamEx ### Target Entity: Deep Panda ### Text Passage: StreamEx is a malware family that has been used by Deep Panda since at least 2015. In 2016, it was distributed via legitimate compromised Korean websites.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Cardinal RAT ### Target Entity: Windows ### Text Passage: Cardinal RAT can collect the hostname, Microsoft Windows version, and processor architecture from a victim machine.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Sykipot ### Target Entity: net ### Text Passage: Sykipot may use net view /domain to display hostnames of available systems on a network.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: NKAbuse ### Target Entity: Go ### Text Passage: NKAbuse is a Go-based, multi-platform malware abusing NKN (New Kind of Network) technology for data exchange between peers, functioning as a potent implant, and equipped with both flooder and backdoor capabilities.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: POSHSPY ### Target Entity: PowerShell ### Text Passage: POSHSPY downloads and executes additional PowerShell code and Windows binaries.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: POSHSPY ### Target Entity: Windows ### Text Passage: POSHSPY downloads and executes additional PowerShell code and Windows binaries.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Exaramel ### Target Entity: Linux ### Text Passage: Exaramel for Linux is a backdoor written in the Go Programming Language and compiled as a 64-bit ELF binary. The Windows version is tracked separately under Exaramel for Windows.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Exaramel ### Target Entity: Go ### Text Passage: Exaramel for Linux is a backdoor written in the Go Programming Language and compiled as a 64-bit ELF binary. The Windows version is tracked separately under Exaramel for Windows.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Exaramel ### Target Entity: Windows ### Text Passage: Exaramel for Linux is a backdoor written in the Go Programming Language and compiled as a 64-bit ELF binary. The Windows version is tracked separately under Exaramel for Windows.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: RoyalDNS ### Target Entity: Nwsapagent ### Text Passage: Ke3chang backdoor RoyalDNS established persistence through adding a service called Nwsapagent.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: RoyalDNS ### Target Entity: Ke3chang ### Text Passage: Ke3chang backdoor RoyalDNS established persistence through adding a service called Nwsapagent.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: FoggyWeb ### Target Entity: Active Directory Federated Services ### Text Passage: FoggyWeb is a passive and highly-targeted backdoor capable of remotely exfiltrating sensitive information from a compromised Active Directory Federated Services (AD FS) server. It has been used by APT29 since at least early April 2021.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: APT29 ### Target Entity: FoggyWeb ### Text Passage: FoggyWeb is a passive and highly-targeted backdoor capable of remotely exfiltrating sensitive information from a compromised Active Directory Federated Services (AD FS) server. It has been used by APT29 since at least early April 2021.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: C2 ### Target Entity: FatDuke ### Text Passage: FatDuke can be controlled via a custom C2 protocol over HTTP.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: BrainTest ### Target Entity: Android ### Text Passage: BrainTest is a family of Android malware.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: DoubleAgent ### Target Entity: Chinese ### Text Passage: DoubleAgent is a family of RAT malware dating back to 2013, known to target groups with contentious relationships with the Chinese government.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: DoubleAgent ### Target Entity: Chinese government ### Text Passage: DoubleAgent is a family of RAT malware dating back to 2013, known to target groups with contentious relationships with the Chinese government.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: DarkHydrus ### Target Entity: RogueRobin ### Text Passage: RogueRobin is a payload used by DarkHydrus that has been developed in PowerShell and C#.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: RogueRobin ### Target Entity: PowerShell ### Text Passage: RogueRobin is a payload used by DarkHydrus that has been developed in PowerShell and C#.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: RogueRobin ### Target Entity: C# ### Text Passage: RogueRobin is a payload used by DarkHydrus that has been developed in PowerShell and C#.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: GCMAN ### Target Entity: Putty ### Text Passage: GCMAN uses Putty for lateral movement.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Remexi ### Target Entity: BITSAdmin ### Text Passage: Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Remexi ### Target Entity: C2 ### Text Passage: Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Siloscape ### Target Entity: kubectl ### Text Passage: Siloscape searches for the kubectl binary.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Thrip ### Target Entity: PowerShell ### Text Passage: Thrip leveraged PowerShell to run commands to download payloads, traverse the compromised networks, and carry out reconnaissance.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: C0018 ### Target Entity: AvosLocker ### Text Passage: C0018 was a month-long ransomware intrusion that successfully deployed AvosLocker onto a compromised network. The unidentified actors gained initial access to the victim network through an exposed server and used a variety of open-source tools prior to executing AvosLocker.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: AdFind ### Target Entity: Active Directory ### Text Passage: AdFind is a free command-line query tool that can be used for gathering information from Active Directory.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Ninja ### Target Entity: C++ ### Text Passage: Ninja is a malware developed in C++ that has been used by ToddyCat to penetrate networks and control remote systems since at least 2020. Ninja is possibly part of a post exploitation toolkit exclusively used by ToddyCat and allows multiple operators to work simultaneously on the same machine. Ninja has been used against government and military entities in Europe and Asia and observed in specific infection chains being deployed by Samurai.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: ToddyCat ### Target Entity: Ninja ### Text Passage: Ninja is a malware developed in C++ that has been used by ToddyCat to penetrate networks and control remote systems since at least 2020. Ninja is possibly part of a post exploitation toolkit exclusively used by ToddyCat and allows multiple operators to work simultaneously on the same machine. Ninja has been used against government and military entities in Europe and Asia and observed in specific infection chains being deployed by Samurai.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Ninja ### Target Entity: Europe ### Text Passage: Ninja is a malware developed in C++ that has been used by ToddyCat to penetrate networks and control remote systems since at least 2020. Ninja is possibly part of a post exploitation toolkit exclusively used by ToddyCat and allows multiple operators to work simultaneously on the same machine. Ninja has been used against government and military entities in Europe and Asia and observed in specific infection chains being deployed by Samurai.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Ninja ### Target Entity: Asia ### Text Passage: Ninja is a malware developed in C++ that has been used by ToddyCat to penetrate networks and control remote systems since at least 2020. Ninja is possibly part of a post exploitation toolkit exclusively used by ToddyCat and allows multiple operators to work simultaneously on the same machine. Ninja has been used against government and military entities in Europe and Asia and observed in specific infection chains being deployed by Samurai.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Samurai ### Target Entity: Ninja ### Text Passage: Ninja is a malware developed in C++ that has been used by ToddyCat to penetrate networks and control remote systems since at least 2020. Ninja is possibly part of a post exploitation toolkit exclusively used by ToddyCat and allows multiple operators to work simultaneously on the same machine. Ninja has been used against government and military entities in Europe and Asia and observed in specific infection chains being deployed by Samurai.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Europe ### Target Entity: Asia ### Text Passage: Ninja is a malware developed in C++ that has been used by ToddyCat to penetrate networks and control remote systems since at least 2020. Ninja is possibly part of a post exploitation toolkit exclusively used by ToddyCat and allows multiple operators to work simultaneously on the same machine. Ninja has been used against government and military entities in Europe and Asia and observed in specific infection chains being deployed by Samurai.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Mandrake ### Target Entity: Android ### Text Passage: Mandrake is a sophisticated Android espionage platform that has been active in the wild since at least 2016. Mandrake is very actively maintained, with sophisticated features and attacks that are executed with surgical precision. Mandrake has gone undetected for several years by providing legitimate, ad-free applications with social media and real reviews to back the apps. The malware is only activated when the operators issue a specific command.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TA551 ### Target Entity: SVCReady ### Text Passage: SVCReady is a loader that has been used since at least April 2022 in malicious spam campaigns. Security researchers have noted overlaps between TA551 activity and SVCReady distribution, including similarities in file names, lure images, and identical grammatical errors.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: DarkVishnya ### Target Entity: Impacket ### Text Passage: DarkVishnya has obtained and used tools such as Impacket, Winexe, and PsExec.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: DarkVishnya ### Target Entity: Winexe ### Text Passage: DarkVishnya has obtained and used tools such as Impacket, Winexe, and PsExec.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: DarkVishnya ### Target Entity: PsExec ### Text Passage: DarkVishnya has obtained and used tools such as Impacket, Winexe, and PsExec.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: PsExec ### Target Entity: DarkVishnya ### Text Passage: DarkVishnya has obtained and used tools such as Impacket, Winexe, and PsExec.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: ToddyCat ### Target Entity: Pcexter ### Text Passage: Pcexter is an uploader that has been used by ToddyCat since at least 2023 to exfiltrate stolen files.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TA551 ### Target Entity: IcedID ### Text Passage: Proofpoint assesses with high confidence TA551 IcedID implants were associated with Maze and Egregor ransomware events in 2020. On 20 October 2021, Proofpoint observed emails that appeared to be replies to previous conversations and contained password-protected zipped Word documents. The attachments ultimately lead to the download of Sliver, an open-source, cross-platform adversary simulation and red team platform.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TA551 ### Target Entity: Maze ### Text Passage: Proofpoint assesses with high confidence TA551 IcedID implants were associated with Maze and Egregor ransomware events in 2020. On 20 October 2021, Proofpoint observed emails that appeared to be replies to previous conversations and contained password-protected zipped Word documents. The attachments ultimately lead to the download of Sliver, an open-source, cross-platform adversary simulation and red team platform.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TA551 ### Target Entity: Egregor ### Text Passage: Proofpoint assesses with high confidence TA551 IcedID implants were associated with Maze and Egregor ransomware events in 2020. On 20 October 2021, Proofpoint observed emails that appeared to be replies to previous conversations and contained password-protected zipped Word documents. The attachments ultimately lead to the download of Sliver, an open-source, cross-platform adversary simulation and red team platform.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: IcedID ### Target Entity: Sliver ### Text Passage: Proofpoint assesses with high confidence TA551 IcedID implants were associated with Maze and Egregor ransomware events in 2020. On 20 October 2021, Proofpoint observed emails that appeared to be replies to previous conversations and contained password-protected zipped Word documents. The attachments ultimately lead to the download of Sliver, an open-source, cross-platform adversary simulation and red team platform.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Meteor ### Target Entity: Iranian ### Text Passage: Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Meteor ### Target Entity: Iranian Railways ### Text Passage: Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Meteor ### Target Entity: Ministry of Roads ### Text Passage: Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Meteor ### Target Entity: Urban Development ### Text Passage: Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Stardust ### Target Entity: Meteor ### Text Passage: Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Comet ### Target Entity: Meteor ### Text Passage: Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Indra ### Target Entity: Stardust ### Text Passage: Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Indra ### Target Entity: Comet ### Text Passage: Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Stardust ### Target Entity: Syria ### Text Passage: Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Comet ### Target Entity: Syria ### Text Passage: Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Syria ### Target Entity: Urban Development ### Text Passage: Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Drinik ### Target Entity: Android ### Text Passage: Drinik is an evolving Android banking trojan that was observed targeting customers of around 27 banks in India in August 2021. Initially seen as an SMS stealer in 2016, Drinik resurfaced as a banking trojan with more advanced capabilities included in subsequent versions between September 2021 and August 2022.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Drinik ### Target Entity: India ### Text Passage: Drinik is an evolving Android banking trojan that was observed targeting customers of around 27 banks in India in August 2021. Initially seen as an SMS stealer in 2016, Drinik resurfaced as a banking trojan with more advanced capabilities included in subsequent versions between September 2021 and August 2022.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: India ### Target Entity: Drinik ### Text Passage: Drinik is an evolving Android banking trojan that was observed targeting customers of around 27 banks in India in August 2021. Initially seen as an SMS stealer in 2016, Drinik resurfaced as a banking trojan with more advanced capabilities included in subsequent versions between September 2021 and August 2022.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Linux Rabbit ### Target Entity: C2 ### Text Passage: Linux Rabbit sends the payload from the C2 server as an encoded URL parameter.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Linux Rabbit ### Target Entity: Linux ### Text Passage: Linux Rabbit sends the payload from the C2 server as an encoded URL parameter.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: C0011 ### Target Entity: Transparent Tribe ### Text Passage: C0011 was a suspected cyber espionage campaign conducted by Transparent Tribe that targeted students at universities and colleges in India. Security researchers noted this campaign against students was a significant shift from Transparent Tribe's historic targeting Indian government, military, and think tank personnel, and assessed it was still ongoing as of July 2022.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Transparent Tribe ### Target Entity: India ### Text Passage: C0011 was a suspected cyber espionage campaign conducted by Transparent Tribe that targeted students at universities and colleges in India. Security researchers noted this campaign against students was a significant shift from Transparent Tribe's historic targeting Indian government, military, and think tank personnel, and assessed it was still ongoing as of July 2022.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Transparent Tribe ### Target Entity: Indian government ### Text Passage: C0011 was a suspected cyber espionage campaign conducted by Transparent Tribe that targeted students at universities and colleges in India. Security researchers noted this campaign against students was a significant shift from Transparent Tribe's historic targeting Indian government, military, and think tank personnel, and assessed it was still ongoing as of July 2022.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: India ### Target Entity: Transparent Tribe ### Text Passage: C0011 was a suspected cyber espionage campaign conducted by Transparent Tribe that targeted students at universities and colleges in India. Security researchers noted this campaign against students was a significant shift from Transparent Tribe's historic targeting Indian government, military, and think tank personnel, and assessed it was still ongoing as of July 2022.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: APT-C-36 ### Target Entity: C2 ### Text Passage: APT-C-36 has used port 4050 for C2 communications.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: RCSAndroid ### Target Entity: Android ### Text Passage: RCSAndroid is Android malware.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: WIRTE ### Target Entity: PowerShell ### Text Passage: WIRTE has downloaded PowerShell code from the C2 server to be executed.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: WIRTE ### Target Entity: C2 ### Text Passage: WIRTE has downloaded PowerShell code from the C2 server to be executed.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: NEODYMIUM ### Target Entity: Wingbird ### Text Passage: Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: May 2016 campaign ### Target Entity: NEODYMIUM ### Text Passage: Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: FinFisher ### Target Entity: NEODYMIUM ### Text Passage: Wingbird is a backdoor that appears to be a version of commercial software FinFisher. It is reportedly used to attack individual computers instead of networks. It was used by NEODYMIUM in a May 2016 campaign.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Hildegard ### Target Entity: kubelets ### Text Passage: Hildegard is malware that targets misconfigured kubelets for initial access and runs cryptocurrency miner operations. The malware was first observed in January 2021. The TeamTNT activity group is believed to be behind Hildegard.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TeamTNT ### Target Entity: Hildegard ### Text Passage: Hildegard is malware that targets misconfigured kubelets for initial access and runs cryptocurrency miner operations. The malware was first observed in January 2021. The TeamTNT activity group is believed to be behind Hildegard.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: jRAT ### Target Entity: VBScript ### Text Passage: jRAT has been distributed as HTA files with VBScript.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: MarkiRAT ### Target Entity: Telegram ### Text Passage: MarkiRAT can check for the Telegram installation directory by enumerating the files on disk.
<related>YES</related>