Datasets:
tokens sequencelengths 2 296 | ner_tags sequencelengths 2 296 |
|---|---|
[
"We",
"believe",
"the",
"TelePort",
"Crew",
"Threat",
"Actor",
"is",
"operating",
"out",
"of",
"Russia",
"or",
"Eastern",
"Europe",
"with",
"the",
"groups",
"major",
"motivations",
"appearing",
"to",
"be",
"financial",
"in",
"nature",
"through",
"cybercrime",
... | [
16,
16,
16,
6,
14,
14,
14,
16,
16,
16,
16,
2,
16,
2,
10,
16,
16,
6,
16,
16,
16,
16,
16,
4,
16,
16,
16,
6,
16,
6,
14
] |
[
"The",
"group",
"behind",
"the",
"OilRig",
"campaign",
"continues",
"to",
"leverage",
"spear-phishing",
"emails",
"with",
"malicious",
"Microsoft",
"Excel",
"documents",
"to",
"compromise",
"victims."
] | [
16,
6,
16,
6,
14,
14,
16,
16,
16,
1,
9,
16,
3,
11,
11,
11,
16,
16,
4
] |
[
"Its",
"major",
"functionality",
"is",
"also",
"implemented",
"through",
"the",
"call",
"of",
"the",
"asynchronous",
"task",
"(",
"“",
"org.starsizew.i",
"”",
")",
",",
"including",
"uploading",
"the",
"incoming",
"SMS",
"messages",
"to",
"the",
"remote",
"C2"... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.WebToos.A6",
"Trojan.Gadoopt.Win64.4",
"Trojan/Gadoopt.aa",
"Win64.Backdoor.Gadoopt.b",
"TROJ_WEBTOOS_EL150244.UVPM",
"Win.Trojan.Win64-93",
"BackDoor.Gates.19",
"TROJ_WEBTOOS_EL150244.UVPM",
"TR/Gadoopt.maz",
"Trojan:Win32/WebToos.A",
"... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"short",
",",
"constant",
"string",
"of",
"characters",
"is",
"inserted",
"at",
"strategic",
"points",
"to",
"break",
"up",
"keywords",
":",
"At",
"runtime",
",",
"the",
"delimiter",
"is",
"removed",
"before",
"using",
"the",
"string",
":",
"API",
"OB... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
... |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clodc4c.Trojan.f31e",
"Win32.Packed.VMProtect.a",
"Trojan.Win32.Zapchast.ajbs",
"Trojan.Win32.Black.elkboj",
"Trojan.Win32.Z.Vmprotbad.242576[h]",
"W32/Trojan.TYMW-2040",
"Trojan/Win32.PcClient.R191990",
"Trojan.VMProtect!",
"Trojan.Win32.VMPro... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Below",
"is",
"a",
"collection",
"of",
"API",
"methods",
"and",
"a",
"brief",
"description",
"around",
"their",
"purpose",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9952",
"PWS:MSIL/Bahmajip.A"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"HTTP",
"Communication",
"In",
"addition",
"to",
"the",
"MQTT",
"communication",
",",
"the",
"app",
"also",
"uses",
"plain",
"text",
"HTTP",
"communication",
"in",
"order",
"to",
"download",
"the",
".dex",
"file",
"and",
"upload",
"collected",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.Radminer!O",
"TrojanDropper.Small.PQ4",
"Worm.Radminer.Win32.8",
"Trojan/Radmin.b",
"TROJ_SPNR.03EF12",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Trojan.XJGC-7764",
"Remacc.Radmin",
"TROJ_SPNR.03EF12",
"Dos.Trojan.RAdmin-17",
... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Antavmu.Win32.50",
"Trojan/Antavmu.ejw",
"Trojan.Heur2.RP.E5C8CC",
"Win32.Trojan.WisdomEyes.16070401.9500.9564",
"W32/Trojan2.IKTO",
"Downloader.Trojan",
"Win.Trojan.Antavmu-74",
"Trojan-Downloader.Win32.Murlo.vqg",
"Trojan.Win32.Antavmu.wse... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"today",
"svcws",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Figure",
"4",
":",
"Loader",
"calls",
"initialization",
"method",
"Technical",
"Analysis",
"–",
"Core",
"Module",
"With",
"the",
"main",
"purpose",
"of",
"spreading",
"the",
"infection",
",",
"“",
"Agent",
"Smith",
"”",
"implements",
"in",
"the",
"“",
"core... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
... |
[
"Control",
"of",
"malware",
"from",
"a",
"single",
"center",
"provides",
"maximum",
"flexibility",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"new",
"online",
"banking",
"malware",
"with",
"the",
"same",
"technique",
"used",
"in",
"Operation",
"Emmental",
"has",
"been",
"hitting",
"users",
"in",
"Japan."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
2
] |
[
"Once",
"granted",
"permission",
",",
"it",
"hides",
"its",
"icon",
"from",
"the",
"launcher",
"application",
"list",
"then",
"starts",
"a",
"service",
"that",
"it",
"keeps",
"running",
"in",
"the",
"background",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"most",
"advanced",
"mobile",
"malicious",
"programs",
"today",
"are",
"Trojans",
"targeting",
"users",
"’",
"bank",
"accounts",
"–",
"the",
"most",
"attractive",
"source",
"of",
"criminal",
"earnings",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"name",
"of",
"this",
"injector",
"is",
"based",
"on",
"its",
"version",
"information",
"which",
"is",
"the",
"same",
"for",
"both",
"dotRunpeX",
"versions,",
"consistent",
"across",
"all",
"samples",
"we",
"analyzed",
"and",
"containing",
"ProductName",
... | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
1
] |
[
"The",
"researchers",
"wrote",
":",
"While",
"profit",
"is",
"powerful",
"motivation",
"for",
"any",
"attacker",
",",
"Yingmob",
"’",
"s",
"apparent",
"self-sufficiency",
"and",
"organizational",
"structure",
"make",
"it",
"well-positioned",
"to",
"expand",
"into"... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16
] |
[
"If",
"you",
"want",
"to",
"know",
"more",
"about",
"them",
"—",
"our",
"researchers",
"have",
"an",
"article",
"about",
"them",
"on",
"Securelist",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_DROPPER.FK",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"Infostealer.Gampass",
"TROJ_DROPPER.FK",
"Trojan.Win32.XDR.euxmtw",
"Trojan.MulDrop.18385",
"BehavesLike.Win32.Virut.cc",
"Win32.Infect.a.124448",
"Win32/Trojan.5f3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Server-side",
"Carrier",
"Checks",
"In",
"the",
"JavaScript",
"bridge",
"API",
"obfuscation",
"example",
"covered",
"above",
",",
"the",
"server",
"supplied",
"the",
"app",
"with",
"the",
"necessary",
"strings",
"to",
"complete",
"the",
"billing",
"process",
".... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Delfsnif",
"W32/Backdoor2.GYBX",
"Backdoor.Trojan",
"Trojan.Win32.Delphi.bjxrjc",
"BehavesLike.Win32.Rontokbro.dm",
"W32/Backdoor.XFVH-7108",
"Backdoor.Delfsnif",
"Trj/CI.A",
"Win32.Trojan.Crypt.Alih",
"Hoax.Win32.BadJoke.FakeKAV",
"Wi... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However,",
"we",
"have",
"also",
"observed",
"attacks",
"against",
"surrounding",
"nations",
"and",
"beyond,",
"including",
"targets",
"in",
"India",
"and",
"the",
"USA."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
4,
16,
16,
16,
16,
16,
2,
16,
2,
10
] |
[
"Others",
"may",
"have",
"the",
"necessary",
"permissions",
",",
"but",
"are",
"missing",
"the",
"classes",
"containing",
"the",
"fraud",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"documents",
"were",
"found",
"to",
"drop",
"the",
"following",
"malware",
"families:",
"The",
"previously",
"discussed",
"CONFUCIUS_B",
"malware",
"family",
"A",
"backdoor",
"previously",
"not",
"discussed",
"in",
"the",
"public",
"domain,",
"commonly",
"d... | [
16,
1,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3,
11,
11,
16,
3,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
5,
13,
16,
1,
16,
16,
3,
11,
16,
16,
16,
16,
3
] |
[
"Google",
"later",
"implemented",
"platform-level",
"changes",
"that",
"practically",
"eliminated",
"this",
"attack",
"surface",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"spammed",
"attachments",
"are",
"using",
"a",
"RTF",
"trick",
"or",
"a",
"feature",
"of",
"Windows",
"OS",
"that",
"allows",
"dropping",
"an",
"executable",
"–",
"but",
"not",
"running",
"it",
"–",
"simply",
"by",
"opening",
"the",
"RTF",
"document... | [
1,
9,
9,
16,
16,
16,
1,
9,
16,
16,
1,
9,
9,
9,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"]",
"ponethus",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"Every",
"sample",
"we",
"found",
"was",
"different",
"in",
"size",
"and",
"activity",
"from",
"the",
"others",
"but",
"the",
"internal",
"name",
"and",
"other",
"identifiers",
"were",
"disturbingly",
"similar."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"disguises",
"itself",
"as",
"a",
"file",
"helper",
"app",
"and",
"then",
"uses",
"very",
"advanced",
"anti-debug",
"and",
"anti-hook",
"techniques",
"to",
"prevent",
"it",
"from",
"being",
"reverse",
"engineered."
] | [
16,
3,
1,
16,
16,
16,
1,
9,
9,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.KillAV.60689",
"Packed.Win32.TDSS!O",
"Trojan.KillAV.Win32.3036",
"Trojan/KillAV.caq",
"W32/Trojan2.GLAK",
"Infostealer.Onlinegame",
"Trojan.Win32.KillAV.60689",
"TrojWare.Win32.Patched.KSU",
"Trojan.Click.28899",
"Trojan.1",
"W32/Tr... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9979",
"Backdoor.Trojan",
"Win32/Cyreho.A",
"Trojan.DownLoad2.18592",
"W32.Trojan.Trojan-Backdoor-Cele",
"TR/Dldr.Ftp.E",
"Trojan/Win32.Unknown",
"Trojan.Heur.VP.E82FB1",
"Trojan:Win32/Cyreho.A",
"Trojan.VBRA... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Additionally,",
"we",
"have",
"observed",
"instances",
"of",
"the",
"IsSpace",
"and",
"TidePool",
"malware",
"families",
"being",
"delivered",
"via",
"the",
"same",
"techniques."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Pccontrol.2.1",
"Backdoor.Pccontrol.2.1",
"Backdoor.PcControl!Vqgcs0rOUEs",
"PcControl.C",
"Backdoor.Win32.PcControl.21",
"Backdoor.Pccontrol.2.1",
"Trojan.Win32.PcControl.cbiyio",
"Backdoor.Pccontrol.2.1",
"Backdoor.Win32.PcControl.21",
... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Bacterio61.A",
"Trojan.Bacterio61.A",
"Trojan.Bacterio61.r3",
"Trojan.Bacterio61.A",
"Trojan.Bacterio61.A",
"Trojan.Bacterio61!xosA0+L/cz0",
"Trojan.Dropper",
"TROJ_BACTERIO.61",
"Trojan.Win32.Bacterio61",
"Trojan.Win32.Bacterio61.fdse",
... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.CDB.3cb9",
"Virus.Win32.Patched"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"Finally",
",",
"the",
"Ashas",
"adware",
"family",
"has",
"its",
"code",
"hidden",
"under",
"the",
"com.google.xxx",
"package",
"name",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"1",
":",
"Landing",
"page",
"for",
"phishing",
"scheme",
"asking",
"for",
"the",
"victim",
"’",
"s",
"signatory",
"number",
"and",
"PIN",
"using",
"stolen",
"branding",
"from",
"Bank",
"Austria",
"Because",
"the",
"actor",
"delivered",
"phishing",
... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.4CE7",
"Backdoor/W32.Tropoly.C",
"Backdoor.CPEX.Win32.21496",
"Trojan/Inject.aisx",
"Trojan.Heur.E7B492",
"Trojan.Win32.A.Inject.48640.F",
"TrojWare.Win32.Pincav.N",
"Trojan.PWS.Reggin.91",
"BehavesLike.Win32.Ramnit.pc",
"Trojan.Win32... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Tregwihc.Trojan",
"Trojan.Inject.GK",
"Worm/W32.AutoRun.114688",
"W32/Autorun.worm.dw",
"W32/AutoRun.lrf",
"TROJ_FAM_0000e93.TOMA",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"W32/Worm.FWLR-5025",
"Trojan.Minit",
"Win32/Milsni.D",
"TROJ_... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"LNK.Trojan.3171",
"LNK/Trojan.TPJW-5",
"LNK_ARGULONG.SMLNK",
"HEUR:Trojan.WinLNK.Powecod.a",
"LNK_ARGULONG.SMLNK",
"LNK/Trojan.TPJW-5",
"HEUR:Trojan.WinLNK.Powecod.a",
"Trojan.LNK",
"virus.lnk.powershell.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"commediauploader",
"[",
"."
] | [
9,
9,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SasfisB.Worm",
"Win32.Worm.Wukill.D",
"Email-Worm.Win32.Rays!O",
"Worm.WuKill",
"Worm.Rays.Win32.1",
"Worm.Wukill",
"Win32.Worm-Email.Rays.a",
"W32.Wullik@mm",
"Win.Worm.Rays-1",
"Email-Worm.Win32.Rays.d",
"Win32.Worm.Wukill.D",
"Trojan.W... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"document",
"contains",
"an",
"encoded",
"Visual",
"Basic",
"Script",
"VBScript",
"typical",
"of",
"previous",
"Carbanak",
"malware."
] | [
16,
1,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Fynloski.H",
"Win32.Trojan",
"Trojan.MSIL.Crypt.cxp",
"Trojan.Inject.54745",
"TR/PSW.Fignotok.LW",
"Trojan-Dropper.Small!IK",
"Trojan/Jorik.ovo",
"TrojanDownloader:Win32/Batosecu.A",
"Trojan/Win32.Jorik",
"Trojan.Jorik.Fynloski.ft",
"Trojan... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Joke.Jepruss",
"Hoax.Win32.BadJoke!O",
"Joke.Russianjep",
"Joke.Jepruss",
"Joke.Jepruss",
"W32/Joke.NX",
"Joke.JepRuss",
"JOKE_ONLYGAME.A",
"Win.Joke.Jep-1",
"Joke.Jepruss",
"Hoax.Win32.BadJoke.JepRuss",
"Joke.Jepruss",
"Riskware.Win32.JepR... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Seimon.G",
"Trojan.Seimon.G",
"Trojan.Seimon.G",
"Trojan.Seimon!4f7JwSpV94c",
"Trojan.Seimon.G",
"TrojWare.Win32.Trojan.Seimon.G0",
"Trojan.Seimon.G",
"Trojan.DownLoad.3195",
"BehavesLike.Win32.PWSGamania.lh",
"W32/PhishExe.B!tr.dldr",
"... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9563",
"W32/Application.THZK-5586",
"BehavesLike.Win32.BadFile.rc",
"Trojan.Win32.PSW",
"Trojan.Application.Zusy.D3D00C",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"WolfRAT",
"application",
"screen",
"The",
"Google",
"GMS",
"and",
"Firebase",
"service",
"has",
"been",
"added",
",",
"however",
",",
"no",
"configuration",
"has",
"been",
"found",
",",
"even",
"though",
"services",
"seem",
"to",
"be",
"referenced",
"in",
"... | [
3,
16,
16,
16,
5,
13,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"page",
"was",
"designed",
"to",
"steal",
"users",
"’",
"bank",
"card",
"details",
":",
"2017–2018",
"From",
"early",
"2017",
",",
"the",
"HTML",
"phishing",
"pages",
"bank.html",
",",
"update.html",
"and",
"extortionist.html",
"started",
"appearing",
"... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16,
1,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.KillFiles!O",
"Trojan.Birele",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Risk.GBTW-1754",
"Ransom_Birele.R038C0DLB17",
"Trojan-Ransom.Win32.Birele.gss",
"Trojan.Win32.Dropper.rpje",
"Trojan.Win32.Scar.56320.B",
"Troj.Ransom.W3... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Here",
"is",
"a",
"command",
"and",
"control",
"protocol",
"fragment",
":",
"Commands",
"from",
"C2",
"server",
"parsing",
"In",
"total",
",",
"the",
"malicious",
"APK",
"handles",
"16",
"different",
"commands",
":",
"Command",
"Endpoint",
"Description",
"1",... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1... |
[
"It",
"will",
"also",
"report",
"the",
"version",
"of",
"Android",
"that",
"the",
"phone",
"is",
"running",
"and",
"any",
"additional",
"capabilities",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"beginning",
",",
"this",
"threat",
"group",
"mainly",
"targeted",
"Asian",
"countries",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"Google",
"Play",
"Protect",
"detects",
"one",
"of",
"these",
"apps",
",",
"Google",
"Play",
"Protect",
"will",
"show",
"a",
"warning",
"to",
"users",
"."
] | [
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Jacard",
"Win32.Trojan.WisdomEyes.16070401.9500.9987",
"W32/Trojan.YDYO-6019",
"Trojan-Banker.BestaFera",
"Trojan-Banker.Win32.BestaFera.amyc",
"Trojan.Win32.Banker.euxhdn",
"Trojan.Win32.Z.Jacard.2528768",
"BehavesLike.Win32.BadFile.vh",
"T... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recently",
"the",
"Mobile",
"Malware",
"Research",
"Team",
"of",
"Intel",
"Security",
"found",
"on",
"Google",
"Play",
"a",
"new",
"campaign",
"of",
"Android/Clicker.G",
"in",
"dozens",
"of",
"published",
"malicious",
"apps."
] | [
16,
16,
4,
12,
12,
12,
12,
12,
12,
16,
16,
5,
13,
16,
16,
6,
16,
1,
16,
16,
16,
16,
5,
13
] |
[
"According",
"to",
"Google",
",",
"whom",
"we",
"have",
"contacted",
"to",
"alert",
"about",
"our",
"discoveries",
",",
"nearly",
"25",
"variants",
"of",
"this",
"spyware",
"were",
"uploaded",
"on",
"Google",
"Play",
"Store",
"."
] | [
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16
] |
[
"AlienVault",
"Labs",
"has",
"extracted",
"related",
"samples",
"and",
"located",
"the",
"infrastructure",
"used",
"by",
"attackers"
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Brackash.C",
"Trojan.Brackash.C",
"Win32.Trojan.WisdomEyes.16070401.9500.9774",
"Trojan.Win32.Sadenav.b",
"Trojan.Brackash.C",
"Trojan.Brackash.C",
"Brackash.dll",
"Virus.Trojan.Win32.Sadenav",
"Trojan/Sadenav.aic",
"W32.Trojan.Brackash.C"... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"of",
"the",
"most",
"common",
"ways",
"to",
"do",
"this",
"is",
"by",
"displaying",
"advertisements",
"to",
"users",
"or",
"by",
"offering",
"in-app",
"purchases",
"IAPs."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"doing",
"so",
",",
"users",
"can",
"become",
"victims",
"to",
"malicious",
"apps",
"portraying",
"themselves",
"as",
"the",
"original",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"reality",
",",
"this",
"downloaded",
"app",
"is",
"a",
"fake",
"app",
"that",
"asks",
"for",
"credentials",
"and",
"Android",
"permissions",
"(",
"including",
"camera",
"and",
"phone",
"permissions",
")",
",",
"resulting",
"in",
"the",
"user",
"being"... | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"blog",
"post",
"outlines",
"the",
"details",
"about",
"the",
"campaign",
"that",
"we",
"discovered."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16
] |
[
"The",
"local",
"privileges",
"escalation",
"backdoor",
"code",
"for",
"debugging",
"ARM-powered",
"Android",
"devices",
"managed",
"to",
"make",
"its",
"way",
"in",
"shipped",
"firmware",
"after",
"firmware",
"makers",
"wrote",
"their",
"own",
"kernel",
"code",
... | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"server",
"can",
"use",
"this",
"information",
"to",
"determine",
"if",
"the",
"user",
"’",
"s",
"carrier",
"is",
"one",
"of",
"Bread",
"’",
"s",
"targets",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"A",
"new",
"CC",
"infrastructure",
"consisting",
"of",
"a",
"climbing",
"club",
"website."
] | [
16,
16,
5,
13,
16,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"O97M.Dropper.BR",
"W97M.Downloader",
"W2000M/Dldr.Rogue.aipbta",
"HEUR.VBA.Trojan.e",
"virus.office.qexvmc.1095"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.BackdoorSlingup.Trojan",
"Trojan/W32.Fsysna.77824.F",
"Heur.Win32.VBKrypt.3!O",
"Backdoor.Slingup.MF.150",
"Win32.Worm.VB.rt",
"W32/Trojan.XMLD-4299",
"W32.Difobot",
"BKDR_GORYNYCH.SM",
"Trojan.Win32.Fsysna.ccit",
"Trojan.Win32.Fsysna.dwujaf"... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor:MSIL/Hulpob.A"
] | [
16,
3,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Fsysna",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Trojan.HAEY-9385",
"Trojan.Bisonal",
"Trojan.Win32.Fsysna.ccap",
"Troj.W32.Fsysna!c",
"Trojan.DownLoad3.19183",
"BehavesLike.Win32.Dropper.vz",
"Trojan.Win32.Fsysna.ccap",
"Trojan... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"addition,",
"the",
"compromised",
"devices",
"were",
"pushed",
"Trojan",
"updates,",
"which",
"allowed",
"the",
"attackers",
"to",
"extend",
"their",
"capabilities."
] | [
16,
16,
16,
5,
13,
16,
16,
3,
11,
16,
16,
16,
6,
16,
16,
16,
16
] |
[
"In",
"February",
"2016",
"one",
"of",
"the",
"largest",
"cyber",
"heists",
"was",
"committed",
"and",
"subsequently",
"disclosed."
] | [
16,
0,
8,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16
] |
[
"Cyber",
"espionage",
"actors,",
"now",
"designated",
"by",
"FireEye",
"as",
"APT32",
"OceanLotus",
"Group,",
"are",
"carrying",
"out",
"intrusions",
"into",
"private",
"sector",
"companies",
"across",
"multiple",
"industries",
"and",
"have",
"also",
"targeted",
"... | [
6,
14,
14,
16,
16,
16,
4,
16,
6,
14,
14,
16,
16,
16,
1,
16,
4,
12,
12,
16,
16,
4,
16,
16,
16,
16,
4,
12,
12,
16,
4
] |
[
"The",
"infected",
"apps",
"in",
"this",
"campaign",
"were",
"downloaded",
"several",
"million",
"times",
"by",
"unsuspecting",
"users."
] | [
16,
5,
13,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Charger",
"was",
"found",
"embedded",
"in",
"an",
"app",
"called",
"EnergyRescue",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Bot.MSIL",
"Trojan.Win32.StartPage.czmqzt",
"Trojan.DownLoader12.20620",
"BehavesLike.Win32.Backdoor.ch",
"TR/Dropper.MSIL.47116",
"MSIL/StartPage.AI!tr",
"Trj/CI.A",
"Msil.Trojan.Dropper.Hqll",
"Trojan.MSIL.StartPage",
"MSIL3.BCNZ",
"... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Primarily",
"targets",
"users",
"in",
"Brazil",
"with",
"fake",
"attatchments,",
"for",
"example:",
"Auto_De_Infracao_e_Sua_Notificacao_493275324.exe"
] | [
16,
16,
16,
16,
2,
16,
1,
9,
16,
16,
1
] |
[
"The",
"connection",
"between",
"the",
"two",
"campaigns",
"remains",
"unclear",
",",
"and",
"it",
"is",
"possible",
"that",
"one",
"borrowed",
"code",
"from",
"the",
"other",
",",
"knowingly",
"or",
"unknowingly",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"is",
"named",
"Red",
"Leaves",
"after",
"strings",
"found",
"in",
"the",
"malware."
] | [
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
3
] |
[
"Reflection",
"Most",
"methods",
"for",
"hiding",
"API",
"usage",
"tend",
"to",
"use",
"Java",
"reflection",
"in",
"some",
"way",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"first",
"discovery",
"was",
"after",
"a",
"highly",
"Libyan",
"influential",
"Telegram",
"account",
"compromised",
"via",
"web"
] | [
16,
3,
16,
16,
16,
16,
16,
4,
12,
12,
1,
9,
9,
16,
7
] |
[
"Recently,",
"we",
"saw",
"an",
"app",
"that",
"leads",
"to",
"a",
"third-party",
"app",
"store",
"being",
"offered",
"on",
"the",
"official",
"iOS",
"App",
"Store."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
5,
13,
13,
13
] |
[
"This",
"paper",
"presents",
"ESET's",
"findings",
"about",
"Operation",
"Groundbait",
"based",
"on",
"our",
"research",
"into",
"the",
"Prikormka",
"malware",
"family."
] | [
16,
16,
16,
4,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.AutoRun!O",
"Worm.AutoRun.13924",
"W32.W.Fearso.kYUv",
"HT_STARTPAGE_FB090419.UVPM",
"Win32.Trojan.Delf.it",
"HT_STARTPAGE_FB090419.UVPM",
"Win.Trojan.Delf-1006",
"Trojan.Win32.Fsysna.digg",
"TrojWare.Win32.Magania.~AD",
"Worm.Delf.Win... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"the",
"course",
"of",
"our",
"research",
"we",
"uncovered",
"the",
"activity",
"of",
"a",
"hacking",
"group",
"which",
"has",
"Chinese",
"origins."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
2,
10
] |
[
"This",
"means",
"that",
"all",
"apps",
"that",
"were",
"using",
"this",
"file",
"will",
"lose",
"some",
"functionality",
"or",
"even",
"start",
"crashing",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/Darby.N",
"Win32.Worm.P2p.Darby.N",
"Worm/W32.Darby.140470",
"W32.W.Darby.n!c",
"Win32.Worm.P2p.Darby.N",
"Worm.P2P.Darby!NxHEqfnePM8",
"W32/Darby.M",
"W32.HLLW.Darby",
"Win32/Darby.N",
"P2P-Worm.Win32.Darby.n",
"Trojan.Win32.Darby.epif",... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Yesterday,",
"Microsoft",
"patched",
"CVE-2015-2424,",
"a",
"vulnerability",
"in",
"Microsoft",
"Office",
"discovered",
"by",
"iSIGHT",
"Partners",
"while",
"monitoring",
"the",
"Russian",
"cyber",
"espionage",
"team",
"we",
"call",
"Tsar",
"Team."
] | [
16,
4,
16,
1,
16,
7,
16,
5,
13,
16,
16,
4,
12,
16,
16,
16,
6,
14,
14,
14,
16,
16,
6,
14
] |
[
"All",
"the",
"IP",
"addresses",
"belong",
"to",
"the",
"same",
"company",
"Hetzner",
",",
"an",
"IP-hosting",
"firm",
"in",
"Germany",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsIemusi.2209",
"W32/Trojan.GCQE-8180",
"DDOS_HPNITOL.SM",
"Trojan.Boht",
"Trojan.Win32.DownLoad.bfqxfq",
"Troj.W32.Vilsel.lmbl",
"Trojan.DownLoad3.40817",
"BehavesLike.Win32.HLLPPhilis.lc",
"Backdoor:Win32/Bezigate.B",
"Trj/CI.A",
"Win32/... | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Distribution",
"via",
"botnets",
"."
] | [
16,
16,
16,
16
] |
[
"The",
"embedded",
"app",
"appears",
"to",
"be",
"a",
"media",
"player",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"real",
"C",
"&",
"C",
"address",
"is",
"encoded",
"in",
"the",
"Twitter",
"names",
",",
"and",
"can",
"only",
"be",
"revealed",
"once",
"decoded",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Oftentimes",
",",
"the",
"emailed",
"link",
"is",
"a",
"bit.ly",
"shortened",
"link",
",",
"used",
"to",
"potentially",
"evade",
"detection",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com",
"hxxp",
":",
"//mailsa-wqw",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"It",
"eventually",
"kills",
"all",
"threads",
"that",
"belong",
"to",
"these",
"undesired",
"modules",
"(",
"using",
"ZwQueryInformationThread",
"native",
"API",
"with",
"ThreadQuerySetWin32StartAddress",
"information",
"class",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"an",
"incident",
"response",
"engagement",
"in",
"September",
"2016,",
"SecureWorks®",
"incident",
"response",
"analysts",
"observed",
"payment",
"card",
"data",
"being",
"collected",
"by",
"a",
"generic",
"remote",
"access",
"trojan",
"RAT",
"rather",
... | [
16,
16,
16,
16,
16,
16,
0,
8,
4,
12,
12,
12,
16,
1,
9,
9,
9,
9,
16,
16,
3,
11,
11,
11,
11,
16,
16,
3,
11,
11
] |
[
"The",
"said",
"attackers,",
"who",
"showed",
"familiarity",
"and",
"in-depth",
"knowledge",
"of",
"their",
"agencies'",
"network",
"topology,",
"tools,",
"and",
"software,",
"were",
"able",
"to",
"gain",
"access",
"to",
"their",
"targeted",
"servers",
"and",
"i... | [
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
13,
13,
16,
16,
16,
1,
9,
16,
16,
5,
13,
16,
16,
3
] |
CyNER 2.0 Augmented Dataset
CyNER 2.0 Augmented Dataset is a comprehensive dataset designed for Named Entity Recognition (NER) tasks, specifically tailored for cybersecurity-related text. This dataset combines an original cybersecurity NER dataset (bnsapa/cybersecurity-ner) with additional augmented data (taken from OPENCTI using AlienValut Connect), resulting in a robust resource for training and evaluating models on cybersecurity entity recognition.
Dataset Overview
The dataset is divided into three splits:
- Train: 7,751 examples
- Validation: 1,661 examples
- Test: 1,662 examples
Each example in the dataset consists of a sequence of tokens and their corresponding NER tags. The dataset has been carefully preprocessed to ensure high quality and consistency. The dataset mostly contains threat and intelligence report descriptions from the Alien Vault
Features
tokens: A sequence of strings representing the tokens in the text.
ner_tags: A sequence of strings representing each token's Named Entity Recognition tags.
NER Tags
The NER tags follow the BIO (Begin, Inside, Outside) tagging format and cover various cybersecurity-related entities, including but not limited to:
- B-Indicator: Indicators of Compromise (IOCs) such as IP addresses, file hashes, and domain names.
- I-Indicator: Continuation of an Indicator entity.
- B-Malware: Names of malware, trojans, or viruses.
- I-Malware: Continuation of a Malware entity.
- B-Organization: Names of organisations, companies, or groups.
- I-Organization: Continuation of an Organization entity.
- B-System: Operating systems, software, and platforms.
- I-System: Continuation of a System entity.
- B-Vulnerability: Known vulnerabilities or CVEs (Common Vulnerabilities and Exposures).
- I-Vulnerability: Continuation of a Vulnerability entity.
- B-ThreatActor: Threat actor names or groups (e.g., Threat_group).
- I-ThreatActor: Continuation of a ThreatActor entity.
- B-Date: Specific dates related to incidents or reports.
- I-Date: Continuation of a Date entity.
- O: Outside of any named entity.
Usage
This dataset is suitable for training, fine-tuning, and evaluating NER models, particularly those designed for cybersecurity applications. It has been structured to work seamlessly with popular NLP frameworks such as Hugging Face's transformers and dataset libraries.
License
This dataset is released under the MIT License, which allows for open and flexible usage with minimal restrictions. Users are free to use, modify, and distribute the dataset, provided that proper attribution is given to the original creators.
Citation
If you use this dataset in your research, please cite it as follows:
@dataset{pranava_kailash_2024_cyner,
title={CyNER 2.0 Augmented Dataset},
author={Pranava Kailash},
year={2024},
howpublished={Hugging Face, https://huggingface.co/datasets/PranavaKailash/CyNER2.0_augmented_dataset},
license={MIT}
}
Contact
For questions or issues regarding the dataset, please get in touch with pranavakailashsp@gmail.com.
- Downloads last month
- 28